Table 5. Threats and risks for VoIP
Threat
Risk Issues
Eavesdropping through interception
and/or duplication
Access can be gained through any access point to the voice network
(particularly if there are wireless access points in the same network that
supports the VoIP service). Once access has been gained, network sniffer
tools are commonly available to intercept IP–based traffic.
Loss, alteration or deletion of
content
Exposure to programmed attack e.g. programmed substitution of Dual-Tone
Multi-Frequency (DTMF) or Interactive Voice Response (IVR).
Caller ID/location may not be
identified in an emergency
Complex numbering schemes, combined with incorrect PSTN access point
routing, may provide wrong location information to emergency services. There
is a greater risk of this happening when calls from remote offices are routed
over a Wide Area Network (WAN) before reaching the PSTN.
Lack of capacity/system
management
Other network traffic can impact on VoIP traffic.
Denial of service attack
Swamping of network traffic resulting in no capacity to support voice. Can be
targeted from within the enterprise or externally.
Viruses and other malware
Swamping of network traffic resulting in no capacity to support voice. Can be
targeted from within the enterprise or externally. Viruses can also target
specific VoIP protocols.
Power failure
VoIP is different to traditional telephony in that voice services are potentially
vulnerable to a number of power failure points within the data network, e.g. local
router and switches. In contrast, traditional telephony handsets are powered
from one centralised point, usually with a backup battery bank.
Source: Trusted Information Sharing Network (TISN) “Security of Voice over Internet Protocol: Advice for Chief
Information Officers”, September 2005. Online at
:
http://www.dcita.gov.au/communications_for_business/security/critical_infrastructure_security
(last accessed April
2007).
DSTI/ICCP/CISP(2007)2/FINAL
53
An issue which may need to be specifically addressed in the context of NGN security, is Identity
Management, which in the NGN field has been technically described (at the working level) as the
“management by NGN providers of trusted attributes of an entity such as: a subscriber, a device or a
provider”.
138
In a converged environment users could be able to use a single authentication mechanism
(sign-in) on any access point to the NGN. The development and implementation of an authentication
mechanism allowing a single and secure identification while protecting users’ privacy, however, meets
complex technical challenges.
139
In an environment with multiple providers, a common authentication
process is difficult to achieve, and crucial in order to maintain a relationship between users, devices, and
service and access providers. In addition, interoperable Identity Management is an issue which spans all
layers from infrastructure to applications, and requires both technical and regulatory approaches
harmonised at the international level.
140
DSTI/ICCP/CISP(2007)2/FINAL
54
Dostları ilə paylaş: |