3.5: Voice Over IP Flashcards
Trunking
Trunks can connect an organization’s private branch exchange (PBX) to telecommunications providers that offer VoIP trunking.
What are trunks
telecommunications circuits designed to carry several simultaneous telephone conversations.
VoIP Threats and Vulnerabilities
VOIP systems are connected to the TCP/IP network thus is vulnerable to all types of attacks that plague workstations and servers.
Type of Threats and Vulnerabilities
- Eavesdropping -
- Spoofing
- Malware
- Denial of service
- Toll fraud - Attack designed to steal long-distance service by using another organization’s telephone network for one’s personal use.
How to protect VOIP
Because VoIP systems communicate over TCP/IP, and because many are based on conventional operating systems, VoIP is protected through primarily the same measures that are used to protect other IT systems.
Private Bank Exchange (PBX)
It’s a private telephone switch used by an organization to manage its internal telephone calls, as well as telephone calls with parties in the public telephone network.
PBX Threats and vulnerabilities
- Default Passwords on an administrator console
- Dial -in modem - dial-in using default password or no authentication at all.
- Toll fraud
- Espionage
PBX countermeasures
- Admin access control
- Physical access control
- Regular log reviews
- Calling restriction