VoIP security still a major issue

December 2003 Integrated Solutions, Products & Solutions

A recent column by Steve Taylor, president of Distributed Networking Associates, writing for Network World in the US is instructive. As networking starts to impact on the design and installations of security solutions, so the need to secure these solutions becomes increasingly important. Taylor's comments on how security concerns are impeding voice-over-IP implementation are a red flag to end-users and purveyors of network-based security solutions, and it is for this reason that his thoughts are published in Hi-Tech Security Solutions this month.

Says Taylor, "According to Webtorial's recent 2003 VoIP 'State of the market report' (available for download at www.webtorials.com), about 40% of the approximately 300 respondents cited security as one of the top four reasons why they have not deployed VoIP. Digging deeper into the results, about 25% of the respondents cited concern about security of the network infrastructure as a major problem, while the rest took a less drastic view of the problem."

Taylor suggested that when asked about security of the network infrastructure vs the security of voice content, the greater concern was about the infrastructure.

"The recent Blaster and SoBig-f attacks demonstrate that some of these concerns are well-founded - especially if the network infrastructure is not appropriately cared for. Some VoIP users who did not apply patches to protect against Blaster found their VoIP networks bogged down along with their data applications. Blaster-type attacks will force companies to take patches and upgrades more seriously. This additional diligence in securing the data network will have the side benefit of protecting the VoIP infrastructure," he maintains.

"But SoBig-f exposed a separate and equally disturbing VoIP vulnerability. By affecting e-mail, SoBig-f had a severe effect on thousands - if not millions - of PCs. While e-mail problems were being resolved, the PC became unusable for other applications. If you are dependent on your PC for telephony, when your PC becomes unstable, your phone becomes unstable, too. This raises some serious questions about the wisdom of adopting soft phones - software that turns PCs into IP-based phones - as a part of overall VoIP implementation."

Added taylor, "According to the 'State of the market report', end users strongly favour maintaining their traditional phones as part of their overall voice infrastructure. When asked about the importance of integrating traditional phones into the VoIP infrastructure and given five choices from 'not important at all' to 'extremely important', more than half of the respondents chose 'very important' or 'extremely important'. It is not clear whether security concerns were a part of this desire to maintain traditional phones at the time the survey was taken, but it is another issue that must be considered."

Concluded Taylor, "Overall, virus/worm incidents should not have a major effect on the VoIP market. These are data security issues, and when they are addressed for the data network, the VoIP installation will be addressed by default. But virus/worm incidents do indicate that if you are getting ready to go full-throttle with VoIP, it is common sense to apply any applicable patches to keep your infrastructure up to date."

Perhaps it is about time the security integrators started acquainting themselves with the potential hindrances to the roll out of network-based solutions?





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
International access manufacturer sets up shop in SA
Technews Publishing Access Control & Identity Management News & Events Products & Solutions
The South African security market can always use some good news, and this year, STid has obliged by formally entering the South African market, setting up its main office in the Boomgate Experience Centre in Roodepoort, Johannesburg.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...