Nt1330 Unit 3

Words: 2006
Pages: 9

Fig. 1. Use case diagram for a VoIP system
Therefore, a number of people confront the risks of too protection against VoIP attacks. highlighted as the following: [8]-The firewall must be able to discover and check VoIP protocols and carefully check out the IP datagram.
1) common firewall is not suitable for VoIP networks, and a specialized firewall needed.
2) The firewall must be able to analyses the effective load of the VoIP to discover the attack.
3) To manage, message or calls over the VoIP system also to set up the different authorities of different users. need to control gateway point. incoming and outgoing details of the VoIP network.
4) Over VoIP works by using the channel function to protect the details for both ends. IPSec can make VoIP
…show more content…
to prevent tampering or deleting from internal and external unauthorized users. This type of data includes system logs, logs associated with firewall, FTP, World wide web, and anti-virus software, system audit records, network traffic monitoring, the appropriate operating system (like the Home windows operating-system) and also the hidden files or temporary files of databases, database operation records, hard disk swap, slack data and free buffers, software configuration data script files, Internet browser data buffers e-mail real-time chat records, bookmarks, history records or session logs[13].
b) the most effective that provides through Collecting information details, from user root file by CVOIP-FRU filter engine. and presents all results as an HTML report an information gathering (retrieves user names, contact lists, besides call and SMS logs), from Betamax VoIP products. to the user. since stored information details depends on the type of operating system, information related with forensic. Built is flexible and scalable to other VoIP applications throughout different Operating system (Windows, IOS) platforms