Security in VoIP
September 24, 2012 Editor 0
VoIP relies on packet switching, similar to the way that e-mails are sent over the Internet. The technology breaks down a voice call into bite-size information packets. Instead of keeping the switch open all the time, the information is sent and received as needed, allowing excess line capacity to be used to carry other data. When the voice data arrives at its destination, it’s reassembled into a voice call. As voice over IP services grow in popularity, the potential for viruses, worms and other security threats aimed at the technology also will grow. The current paper’s purpose is presenting several security solutions and applying them to integrated systems at an economical and social level.
Note: There is a file embedded within this post, please visit this post to download the file.
Continued here: Security in VoIP
- The Subtotal Button for Summarizing Data in an Excel Database
- Improving The Decisional Process By Using UML Diagrams
- Can The Implementation Of E-Learning Technologies Help To Address Learning Challenges? Evidence From A Small Island University
- Embedded software product lines: domain and application engineering model-based analysis processes
- The BSCBAS: a Balanced Scorecard-based appraisal system for improving the performance of software organizations
- What Is Good e-Learning?
Subscribe to our stories
- Can Africa’s tech start-up scene rise to the next level? November 20, 2017
- Chocolate innovation: Sweet tooth hackers solve cocoa farmers’ challenges November 20, 2017
- A new generation of CEOs: Running a business in West Africa as a woman November 20, 2017
- Is crowdfunding the silver bullet to expanding innovation in the developing world? November 20, 2017
- Towards building an Entrepreneurship Ecosystem- Global Entrepreneurship Week and Freetown Pitch Night-The Role and Significance of the Freetown Pitch Night November 20, 2017