Using IP-telephony in network infrastructure and peculiarities of its protection from intruders
DOI:
https://doi.org/10.20535/RADAP.2013.55.135-142Keywords:
ІР-telephony, network infrastructure, means of information network protection, information attacks, information threatsAbstract
The article highlights advantages and drawbacks of using ІР-telephony in network infrastructure and peculiarities of its protection from intruders which concern its information safety: setting interception of IP-calls and change of their content, disposition of the VoIP system to DoS-attacks etc. It has been determined that using of means of information network protection, which are oriented on the features of IP-telephony work, enables to avoid additional financial expenses on modernization of available equipment or acquisition of new protective devices.References
Література
Гайворонський М.В. Безпека інформаційно-комунікаційних систем / М.В. Грай-воронський, О.М. Новіков. – К. : Вид. група BHV, 2009. – 608 c.
Дербенцева К. Защищенная IP-телефония / К. Дербенцева [Электронный ресурс]. – Режим доступа: http://citcity.ru/15561
Закон України "Про захист інформації в інформаційно-телекомунікаційних сис-темах" від 05.07.1994 р., № 80/94, редакція від 30.04.2009 р. [Електронний ресурс]. – Режим доступу: http://zakon4.rada.gov.ua/laws/show/80/94-вр
IP-телефония. Обзор технологии. [Электронный ресурс]. – Режим доступа: http://www.price.od.ua/articles.phtml?id=71
Платов М. Что важно знать об IP-телефонии? [Электронный ресурс]. – Режим до-ступа: http://www.opennet.ru/docs/RUS/voip_asterisk/1.html
Что такое IP-телефония и как это работает. [Электронный ресурс]. – Режим до-ступа: http://itel.com.ua/publications/item=14-chto-takoe-ip-telefoniya-i-kak-eto-rabotaet
References
Haivoronskyi M.V., Novikov O.M. (2009) Bezpeka informatsiino-komunikatsiinykh system [Security Information and Communication Systems]. Kyiv, BHV Publ., 608 p.
Derbentseva K. Secure IP-telephony. Available at: http://citcity.ru/15561(Accessed 01 Dec 2013)
Zakon Ukrainy “Pro zakhyst informatsii v informatsiino-telekomunikatsiinykh syste-makh” [The Law of Ukraine “Data Protection in the information and telecommunication sys-tems”]. Available at: http://zakon4.rada.gov.ua/laws/show/80/94-вр (Accessed 01 Dec 2013)
IP-telephony. Technology review. Available at: http://www.price.od.ua/articles.phtml? id=71 (Accessed 01 Dec 2013)
Platov M. What preferably to know about IP-telephony? Available at: http://www.opennet.ru/docs/RUS/voip_asterisk/1.html (Accessed 01 Dec 2013)
What is IP-telephony and how it works. Available at: http://itel.com.ua/publications/item=14-chto-takoe-ip-telefoniya-i-kak-eto-rabotaet (Accessed 01 Dec 2013)
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).