Description
We have become a mobile society. No longer are we required to be in the office to be able to do our jobs. This freedom has brought security concerns to our organizations. In a 3-4 page paper, describe some of the technologies that allow our workforce to be mobile and then discuss the security issues related to those technologies. Include what mitigating controls we can put in place to protect our data.
Explanation & Answer
Attached.
OUTLINE
INTRODUCTION
BODY
CONCLUSION
Running Head: INFORMATION TECHNOLOGY
Course Title
Student’s Name
Institution Affiliation
Professor’s name
Date
1
INFORMATION TECHNOLOGY
2
Voice over Internet Protocol
It compresses audio to Internet Protocol address Packets to support telephone calls
over TCP/IP network connection. It is cheap and prevalent telephony for solutions in
organizations and for people globally. It is vital to consider security matters when choosing a
Voice over Internet Protocol answer to ensure it offers the security and privacy expected in
the company. Some VoIP is plain-form communication can be eavesdropped and interrupted
without difficulty. However, there are those that are extremely encoded, and an effort to
wiretap or interfere is thwarted and prevented. The VoIP has some disadvantages as attackers
can conduct a board array of a possible attack that may include;
I.
Hackers may be in a position to conduct man-in-the-middle hackers by endpoint
connection reply or tricking call managers.
II.
There are challenges of deploying VoIP phones off similar switches as sever systems
and desktop, depending on the deployment. This might permit a virtual Local area
network and 802.1X verification misrepresentation.
III.
Any number of VoIP tools can be used by the caller ID; therefore, hackers can
perform vising or Spam over Internet Tele...