Voice, Video, and Collaboration Flashcards
4.3.1
Voice over Internet Protocol (VoIP)
set of technologies that enables voice to be sent over a packet network
Session Initiation Protocol
Signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice and messaging applications.
VOIP Attacks vectors
Spoof Caller ID which facilitates vishing (VoIP phishing) or Spam over Internet Telephony(SPIT)
Call management systems and VOIP phones can be vulnerable to host operating systems and DoS attacks
MIMT may succeed by spoofing call managers or endpoint connection transmission
Unencrypted network traffic may include VoIP which makes decoding VoIP streams possible.
Zoombombing
unwanted intrusion by an outsider into a video conference call.
Security measures to zoombombing
Access Controls such as virtual waiting rooms, password protected virtual meetings, and screensharing restrictions.
Instant Messaging (IM) vulnerabilities
Does not enforce strong authentication; can be spoofed
No encryption;packet sniffing
File Transfer and remote access; risk of malicious code deposit
Social Engineering Attacks
Email Security Goals
Secure placement of email servers and gateways on network
Ensure nonrepudiation
Achieve privacy and confidentiality
Classify sensitive content
Email Security Solutions
Digital Signatures
Anti Malware Scanning
Block suspicious attachments
Filters
Encryption
Training