Preview

As The Organization

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
As The Organization
As the organization’s IT security professional, you have been asked by your organization’s CIO and CEO to suggest steps and techniques that would mitigate risks associated with VoIP and SIP applications at the same time, maintaining the controls provided via C-I-A model.
Provide a well-developed (remember who the intended recipients are) response outlining your recommendations. Be sure to substantiate each of your recommendations for mitigating identifiable risks.
Please be sure to provide your response via the proper thread under the discussion question link for this chapter. Please do not submit your reply via email, use only the thread provided by Canvas to submit your responses.

The book mentions some of the risks for VoIP and SIP applications being:
Eavesdropping
Call control
Denial of service (Dos) or distributed denial of service (DDoS)
Poor network performance
Server failure
Disclosure of confidential information
Recommendations to mitigate risks associated with VoIP:
Construction of a reliable and properly configured network:
Ensuring the right equipment is being used, and there is redundancy built into the network infrastructure will help increase the availability, and uptime of services.
Ensuring the network is configured to separate different data (i.e. Voice data, Computer data) through VLANs and using Quality of Service (QoS) routing for voice services will help the integrity of the data being transmitted for VoIP, and also leave the data more secure.
Controlled management of network devices, and user accounts:
Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.
Proper management of user accounts will ensure the information and access to devices on the network confidential.
Set up a solid user policy:
Having a clear and well thought out user policy will keep the work environment and ultimately

You May Also Find These Documents Helpful

  • Powerful Essays

    Primary hardware that must have a backup to ensure availability is the web server and the database server. In addition to having a primary and a backup of each of these two servers a replication server must also be implemented into the architecture in order for the databases on each server to mirror each other. With proper planning and implementation of this system if the primary servers have a failure there will not be any interruption of service to the customer who is accessing the…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Q3- Identify the features of the Internet that make it unlikely to stop working from a single point of failure. Why do you think the internet has such as high degree of redundancy?…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Product lines include VPN, Firewall, Wireless LAN, Biometrics, and Access Control. Using the two sites that contain evaluated products (www.commoncriteriaportal.org or http://www.niap-ccevs.org/cc-scheme/) identify the products that will provide Sony with the optimal solution and use the Security Targets to describe the security functionality it provides, and state how this product reduces the potential risks identified in the media.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The past couple of decades have seen a tremendous growth in technology. Phones, phone calls, and how we make them, are no exception - a lot has changed since the days of the PBX operator. Today a lot of phone calls being made are being made over the internet –vs- over traditional phone lines. Just like everything else on the internet, there are protocols in place when it comes to making and receiving phone calls.…

    • 698 Words
    • 2 Pages
    Good Essays
  • Good Essays

    thesis

    • 2423 Words
    • 9 Pages

    Have all employees sign an acceptable use policy outlining what is and isn’t allowed on the network and the repercussions of violating this agreement…

    • 2423 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Advances in Information Technology have made access to sensitive information with great concern. Privacy has to be paramount as the internet broadens its horizon strategically. Various acts had to be implemented to protect the privacy of individuals. The act that I am going to talk about is the Telephone Consumer Act of 1991, (TPCA).…

    • 484 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Leading Organization

    • 4738 Words
    • 19 Pages

    In an environment changing so rapidly it is difficult to lead and manage, while maintaining profitable growth and competitively advantageous position. International competition is increasing, lowering long term growth and sustainability. It is important to analyze the forces that shape the future of the business world as well as the future of society at large. The traditional management processes need to be revamped and modified to create a new outlook. In the following four portfolios it has been tried to analyze the various aspects of leadership and management. The first portfolio focuses upon the problems that a leader faces at interpersonal levels, and ways to assess and address the problems. The second portfolio focuses upon the different leadership theories which are analyzed in brief, and it has been discussed how a leadership style can be adopted by scrutinizing the theory and matching them with real life situation. The third portfolio encompasses the broader aspects in which an organization operates. It depicts about the organization culture which is the regulatory force in an organization to generate success. The last part, fourth portfolio is based on the facts that managing organization and leading it is a constant process, and to do so we need to be connected to the society and environment. The world…

    • 4738 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Future of Voip Technology

    • 609 Words
    • 3 Pages

    VoIP is a relatively new technology and so the benefits are just beginning to be realized. VoIP technology has the ability to completely change the telephone industry as we know it. Big changes are in store for the way we use telephones and this section will address some of the changes to expect. Obstacles still stand in the way of progression and there are problems that need to be addressed before this technology can take over.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    | ITU-T Recommendations E.800, “Terms and definitions related to quality of service and network performance including dependability,” 1994. Available from http://www.itu.int/rec/T-REC-E.800-199408-S/en…

    • 1225 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The phone companies have to build in internal layer of data security so that the calls data collected is used only by the authorities and the data is not misused by any third parties.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Voip

    • 4718 Words
    • 19 Pages

    Voice Over Internet Protocol (VoIP) and Security Submitted By Sanjay Yadav Amity School Of Engineering And Technology Amity University Rajasthan Table of Contents Abstract......................................................................................................................... 3 Background .................................................................................................................. 3 Quality of Service .........................................................................................................4 Latency ...........................................................................................................................4…

    • 4718 Words
    • 19 Pages
    Powerful Essays