Thursday, May 30, 2019

Voice Over Internet Protocol Attacks Essay -- Information Technology

DefinitionVoIP or Voice over Internet Protocol, is a type of transmissions medium that is responsible for the delivery of real-time voice and data communication. Unlike its analog predecessor in which the transport functionality was r protrudeed via the public switched telephone cyberspace (PSTN), calls are now converted from an analog request to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. Several other key processes, such(prenominal) as signaling, authentication, security, call control, and voice compression, are established by VoIP prior to and during the call setup phase. (Harper, 2011)Essentially, VoIP converts your voice into a digital signal that is sent via the internet. The signal is converted to a standard phone signal before it goes to a land blood line. There are a few ways that VoIP calls are do computer to computer, computer to a network, and network to network. How VoIP worksThe way VoIP wo rks is by using what is called an analog telephone adaptor (ATA). The ATA allows you to connect your phone line to your computer and that allows you to make phone calls across the Internet. The ATA converts the signal from analog to digital. The analog signal is taken from your regular phone and makes it a digital signal so that it can be transmitted through the Internet. One of the most popular providers for VoIP services is Vonage. AT&T is also a provider that uses VoIP and they include an ATA as part of its VoIP service. The setup is actually pretty straightforward, and is a pretty simple installation. Basically, what is required is plugging your phone line into the ATA, and running a phone line out of the ATA into your computer. Tools of the tradeI... ...ding_voip.pdfEdwards, J. (2007, January 11). Voip scams, phishing, and denial of service attacks. Retrieved from http//www.voip-news.com/feature/voip-scams-phishing-dos-011107/Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). venerable Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7554-7557). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Location 7554). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7552-7554). McGraw-Hill Osborne Media. Kindle Edition.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.