مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

466
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Analysis and Prioritization of VoIP Security Challenges

Pages

  183-218

Abstract

 P network architecture is fragile from Security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP Security is essential, and typically the implementation of Security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-Security Security solutions. To do this, by reviewing the research literature, VoIP comprehensive Security matrix has been extracted from a comprehensive list of VoIP Security Challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP Security. The results are consistent with the recommendations and Security Countermeasures mentioned by previous research and Security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from Security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP Security is essential, and typically the implementation of Security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-Security Security solutions. To do this, by reviewing the research literature, VoIP comprehensive Security matrix has been extracted from a comprehensive list of VoIP Security Challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP Security. The results are consistent with the recommendations and Security Countermeasures mentioned by previous research and Security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Bakhtiari, saeid, & Zare, Esmaeil. (2018). Analysis and Prioritization of VoIP Security Challenges. JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES, 7(25 ), 183-218. SID. https://sid.ir/paper/268145/en

    Vancouver: Copy

    Bakhtiari saeid, Zare Esmaeil. Analysis and Prioritization of VoIP Security Challenges. JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES[Internet]. 2018;7(25 ):183-218. Available from: https://sid.ir/paper/268145/en

    IEEE: Copy

    saeid Bakhtiari, and Esmaeil Zare, “Analysis and Prioritization of VoIP Security Challenges,” JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES, vol. 7, no. 25 , pp. 183–218, 2018, [Online]. Available: https://sid.ir/paper/268145/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button