ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

VoIP Network Security

Updated on June 7, 2011

Security and VoIP

It's been noted several times in the past that one of the biggest differences between the regular PSTN network and VoIP from the point of view of the administrators is that VoIP requires active management. This is because the voice data is passed over the Internet and the company's regular LAN which is under the control of the IT department. In the PSTN system, there was no such thing as "overusing" a telephone line. Circuit switching technology ensures that when two people speak over a PSTN system, the entire circuit belongs to them and no one else.

However in a VoIP system, it's possible for a system to become overloaded and require active management on the part of the IT administrators. But there's another aspect of network management which is equally important and must not be overlooked - security. The need to ensure that a VoIP system is secure might not seem as urgent as ensuring clear voice quality for example, but its importance cannot be overestimated.

In the long run, the consequences of a security breach can be very dramatic and damaging. A company could end up getting billed for millions of dollars or its sensitive trade secrets can be stolen by those seeking to hack the network.

VoIP Security
VoIP Security

Network Security

IT administrators responsible for the security of their networks must understand the implications which VoIP will have on it. In the end, it's all about the robustness of the underlying network which will determine whether or not it's susceptible to VoIP attacks. If a particular network is not secure, then VoIP will expose it to even greater dangers. It increases the surface of vulnerability and IT managers must take steps to harden it against intrusions.

There are several different types of threats. Man in the middle attacks can compromise valuable data security and leak trade secrets out of the organization. Other attacks are interested in making use of your VoIP infrastructure to make calls of their own and leave you with the bill. Since VoIP is an evolving field, IT administrators need to keep on their toes and keep themselves informed about the latest threats in the wild. In addition, they must understand the SIP protocol and read up about possible exploits. This doesn't just include the wired LAN but extends to secure mobile hosted VoIP systems as well.

VoIP also allows calls to be recorded in HD voice for later retrieval and the existence of a secure HD voice PBX system is important so that vital trade secrets are not lost.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)