Sunday, August 18, 2019
Voice Over Internet Protocol Attacks Essay -- Information Technology
Definition: VoIP or Voice over Internet Protocol, is a type of transmissions medium that is responsible for the delivery of real-time voice and data communication. Unlike its analog predecessor in which the transport functionality was routed via the public switched telephone network (PSTN), calls are now converted from an analog signal to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. Several other key processes, such as signaling, authentication, security, call control, and voice compression, are established by VoIP prior to and during the call setup phase. (Harper, 2011) Essentially, VoIP converts your voice into a digital signal that is sent via the internet. The signal is converted to a standard phone signal before it goes to a land line. There are a few ways that VoIP calls are made; computer to computer, computer to a network, and network to network. How VoIP works The way VoIP works is by using what is called an analog telephone adaptor (ATA). The ATA allows you to connect your phone line to your computer and that allows you to make phone calls across the Internet. The ATA converts the signal from analog to digital. The analog signal is taken from your regular phone and makes it a digital signal so that it can be transmitted through the Internet. One of the most popular providers for VoIP services is Vonage. AT&T is also a provider that uses VoIP and they include an ATA as part of its VoIP service. The setup is actually pretty straightforward, and is a pretty simple installation. Basically, what is required is plugging your phone line into the ATA, and running a phone line out of the ATA into your computer. Tools of the trade I... ...ding_voip.pdf Edwards, J. (2007, January 11). Voip scams, phishing, and denial of service attacks. Retrieved from http://www.voip-news.com/feature/voip-scams-phishing-dos-011107/ Harper, Allen; Shon Harris; Jonathan Ness; Chris Eagle; Gideon Lenkey; Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7554-7557). McGraw-Hill Osborne Media. Kindle Edition. Harper, Allen; Shon Harris; Jonathan Ness; Chris Eagle; Gideon Lenkey; Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Location 7554). McGraw-Hill Osborne Media. Kindle Edition. Harper, Allen; Shon Harris; Jonathan Ness; Chris Eagle; Gideon Lenkey; Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7552-7554). McGraw-Hill Osborne Media. Kindle Edition.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.