SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Security Strategies
for
UC
Security Strategies for UC
Introduction 	 3
A History Lesson in Telephony Security 	 5
Common Threats Against UC Systems 	 8
UC Security Basics 	 12
UC Security: What You Need to Know 	 18
In the days of legacy phone systems, voice
information was transmitted over the dedicated PSTN
(Public Switched Telephone Network). In many ways
the PSTN is the largest, most robust communications
infrastructure on the planet and it is still in use today. With
the advent of VoIP (Voice over IP), telecommunications is
moving away from this legacy platform onto the Internet.
The SMB business phone system, rather than being
separate equipment, is now another network device able to
interoperate with many new and emerging technologies.
Why is security
important in the SMB
(small and medium-sized
business) space?
Security Strategies
for
UC
Security Strategies
for
Understanding Why UC Systems are Vulnerable
A UC business phone system combines voice, video, chat,
email and presence together into one unified messaging system.
As the technology has become more complex, and more
accessible from the public Internet, the security threat has
increased. In many ways it is easier than ever to attack business
communications. Companies must be diligent to protect their
communications as they are vital to business operations.
A History Lesson in Telephony Security
Security has long been a problem for telecommunications networks.
Even in the legacy days of the PSTN, threats existed. Attackers who were
able to compromise phone systems were known as “phreaks.” Not all
phone phreakers were malicious. Many simply sought to study the
technology. A few were able to manipulate the system for financial gain.
Early telephone networks used in-band frequencies to transmit call
level signaling. For example, AT&T used a single 2600hz tone on
the line to signal that the line was ready to dial long distance calls.
A famous phone phreaker, John Draper, discovered that the toy
whistle found in a Cap’n Crunch
®
cereal box could be
used to emit a 2600hz tone. By blowing the whistle into
the phone, he was able to make free long distance calls.
Why is UC Security Important?
This vulnerability helped usher in greater use of DTMF
(Dual Tone Multi-Frequency) signaling. By using two tones instead
of one, the call control signaling was more difficult to reproduce,
but not for long. Phreaks soon built devices called the “Blue Box.”
This device was able to produce DTMF tones necessary to gain
control over the telecommunications system. Steve Wozniak, who
later went on to help found Apple Inc., is known for being a
phreaker using blue boxes.
A History Lesson in Telephony Security
To avoid this vulnerability, the telecom network
moved to out-of-band signaling; however, DTMF
still exists today. The tones you hear when you press
the keys on a touch tone phone are DTMF tones.
Many mobile and VoIP phones still use these tones
simply because they are familiar to us, even though
they are not needed for signaling.
The historical lesson to learn is that technology
must evolve to stay ahead of those who seek to
exploit it. Although historical phreaks like John
Draper and Steve Wozniak are a type of folk hero,
modern attackers can do real damage to your system
and cost your business large amounts of money. As
technologies evolve, so do the malicious attackers.
It is imperative to stay up-to-date on information
security in order to protect your business’ assets.
A History Lesson in Telephony Security
Toll Fraud
Toll Fraud is a common attack against business phone
systems. In this type of attack the malicious agent
attempts to gain access to your long-distance,
toll-bearing trunks. If they are able to make calls
using your long-distance account then they can get
free calls and you end up paying long distance fees
to your upstream provider. This can be especially
damaging if international calls are made. Companies
with VoIP systems that are compromised by toll fraud
are often left liable for tens of thousands, or even
hundreds of thousands of dollars in long distance fees.
There are many threats that can affect a business
phone system. Four of the most popular are: Toll Fraud,
Denial of Service, Man in the Middle, and Social Engineering.
Knowing what kind of damage can be done serves to
illustrate the importance of securing your phone system.
Common threats against UC systems
Denial of Service
A “DoS” or Denial of Service attack is
one in which an attacker compromises
your system in such a way as to make it
inaccessible to your users. DoS attacks
can be targeted at specific services, such
as stopping the ability to dial out trunks,
or access to remote UC features, or in a
worst case scenario, can bring down the
entire system so that even interoffice calls
cannot be made. When your system is
unavailable to users due to a DoS attack
you will see this cost in terms of lost time
and productivity. Not to mention the loss
of reputation in the eyes of your customers
who are unable to communicate with you.
Common threats
Man in the Middle
A Man in the Middle attack occurs when
an attacker is able to intercept your
traffic and then passes it along. You may
not know that a Man in the Middle attack
is occurring because your services appear
to be working like normal. However, if an
attacker is able to intercept authentication
credentials they could use this information
to perform a DoS or Toll Fraud attack.
Additionally, the attacker could gain
access to private or privileged information.
Common threats
Common threats
Social Engineering
The easiest way to exploit a technology
is to attack humans instead of attacking
the technology. Modern, sophisticated
attackers will often try to gain access to
your system via social engineering rather
than technical exploits. An example would
be a malicious attacker calling one of your
users pretending to be your IT department.
They might ask the user for their password
in order to fix an imaginary problem. The
unsuspecting user offers their authentication
credentials freely. The attacker now
has access to your system.
UC Security Basics
It’s important to understand some common terminology
you’ll hear referenced when talking security. For example,
the acronym CIA (Confidentiality, Integrity and Availability)
is used to describe the desirable attributes of an effective
information security implementation. As you read the rest of
the terms and their descriptions below, think about how
each of these concepts apply to your business.
UC Security Basics
Confidentiality
User data should be confidential.
The only people who should be able to
access your confidential information are
those for whom it is intended. In the case
of business Unified Communications (UC)
systems the data could be voice traffic
or chat messages. Confidentiality is
important both to protect trade secrets
and personal privacy. In the same way
you might close your office door in order
to have a confidential conversation, you
would likewise expect that a phone call
between two parties would be similarly
private. You would not want an uninvited
third party to be able to eavesdrop
on the conversation.
Integrity
The integrity of information refers to the
quality being unchanged. If you receive an
email from a colleague, you should have
a reasonable expectation that the text you
are reading is the actual message they
sent. A malicious attacker intercepting
your message and modifying it could
cause havoc.
Availability
Having a secure network with
confidentiality and integrity is of little
value if your services are unavailable to
your users. A DoS (Denial of Service)
attack is one in which an attacker prevents
access. For example, imagine an attacker
who gains physical access to your server
closet and disconnects the power to your
UC server. The disruption to your phone
service would impact your ability to
provide customer service.
Availability
Availability is also important to keep in
mind when selecting security equipment.
There is a such thing as “too much security.”
For example, imagine you wanted to secure
the hard disk of your PC. You could remove
the disk, encase it in cement and bury it in
the ground. The data on the disk would be
highly confidential—no unauthorized person
would be able to get to it. It would have
high integrity, and be nearly impossible
for an attacker to modify the data on the
disk. However, it would also be completely
unavailable and as such this security tactic
is a futile one. It may seems obvious
that “cement” is a poor choice for
securing UC equipment, however often the
same type of over-handed security polices
are put in place, making the data so “secure”
no one can get to it, even your users.
Mitigation vs Elimination
A truly secure network is one that is not
only protected from attack but is also
accessible when it needs to be. In this
spirit, the goal of information security
should be mitigation not elimination. To
“mitigate” a threat means “to lessen or
make smaller.” It’s never possible to
completely eliminate all threats against
your UC system. If an attacker is
determined enough they will find a way
to break in to your system, however most
attackers are not determined. In general
VoIP security threats most commonly
arise from attackers looking for an easy,
unsecured target. By implementing a
baseline of security best practices you
make your system unattractive to potential
attackers looking for an easy target.
UC Security: What You Need to Know
In particular, securing VoIP networks is not the
same as securing data networks. Most data
traffic is transported over TCP and as such, security
built-in to networking devices such as routers and
firewalls are built around TCP data-centric transport.
VoIP is UDP-based and time sensitive. Dropping a
few packets while downloading a website is for the
most part benign—the packets can simply be
retransmitted. Voice and video streams are more
fragile. Dropping too many UDP packets in a voice
stream can cause call quality issues. As such,
securing your unified communications requires a
balanced approach. You must mitigate threats
while also maintaining quality of service.
Likewise, managing security for an SMB offers
unique challenges when compared to the larger,
enterprise space. While large businesses can often
dedicate substantial resources toward securing their
communications, those in the SMB space need
security solutions that are both effective and simple.
This actually works in favor of the SMBs since
security and simplicity can work together. For
example, installing an expensive and complex
solution to secure you network can work against
you. Improperly configured equipment can affect
your call quality and potentially stop your VoIP
equipment from functioning properly. Remember,
accessibility is key to a secure network.
Unified communications presents unique security challenges because it brings
together disparate technologies. Using VoIP, video, chat and presence together has
proven to provide productivity gains for businesses, but also presents security risks.
1. Deploy a Properly Configured Firewall
2. Enable a VPN for Remote Users
3. Use Strong Passwords
4. Update Regularly
5. Turn Off Unused Services
6. Monitor Your Call Logs
7. Use built-in UC security tools
7 Tips for Effective UC Security
Despite being in a
niche field, securing
unified communications
as an SMB follows
many of the same
security best practices
that are effective in the
enterprise for a variety
of technologies.
The following best
practices can help
keep communications
flowing.
Due to the variety of firewall models
and topologies available, giving
specific advice is difficult. So, here
are some practical tips for almost any
configuration. For starters, it’s always
advisable to keep high importance on
security. This means being technically
familiar with your equipment and it’s
configuration. It is a responsibility you
should take with the utmost seriousness.
When shopping for firewalls favor those
that offer simple configuration and
are designed for the SMB.
1Deploy a Properly Configured Firewall
A good general rule of thumb is to block
all unknown traffic into your network and
then only allow traffic from trusted sources.
This strategy doesn’t usually work well for
your web server, but your UC server should
absolutely be sequestered behind your
firewall. In most cases, you should only
allow Internet traffic from your ITSP
(Internet Telephony Service Providor) or
VoIP provider. This is the company that
supplies you SIP truck or hosted VoIP
services. Allow access only on the ports
necessary and only to the IP or block of
IPs that your provider uses.
1Deploy a Properly Configured Firewall
Some complex firewalls tout features such
as SIP ALG (Application Level Gateway).
Although SIP ALG is advertised as a
security feature for VoIP, it tends to not
work as advertised. Instead, ALGs have a
tendency to mangle SIP packets or modify
headers in a way that breaks functionality.
A general best practice is to do extensive
interoperability testing prior to deployment
or simply disable SIP ALG in your firewall
and/or router.
1Deploy a Properly Configured Firewall
Surprisingly enough, many small, and
even medium-sized businesses do not
deploy a firewall. Or, they deploy a firewall,
but open ports to all networks to allow
remote users. This is almost the same as
having no firewall at all. Although some UC
servers, like Switchvox have built-in attack
mitigation mechanisms, these should not be
solely relied upon. Your firewall is designed
to sort traffic, your UC server is not. Using
each device for its intended purpose will
keep your network the most secure. In the
SMB, managing remote users is better
done through a VPN.
1Deploy a Properly Configured Firewall
VPN stands for Virtualized Private Network. Many SMB
networking devices, such as routers and firewalls, come
with built-in VPN capability. Quality VPN devices are now
available at affordable prices. For your remote users, and
while connecting remote SMB offices, the simplest option
is to deploy a VPN device at both ends. The connected
devices form an encrypted “tunnel” over the public Internet.
This “virtual” network keeps all of your traffic safe.
VPNs have many benefits:
1.	In addition to VoIP, the remote user can access
	 other local network resources such as network
	 shares and intranet web applications.
2.	The traffic is encrypted to maintain privacy
3.	NAT issues are eliminated or diminished
4.	Also, there are only a few ports to open in the
firewall to allow the VPN traffic. They can be
opened to all networks because the VPN requires
authentication before establishing a connection.
2Enable a VPN for remote users
GH289401 78OLN23 NE
577 UND5543L12 B16D
5833XR KRNHI6 AXE29
421 I!IL69960 3DF3D
X345JJ COLUMB#4 28D
YTN88 7EW2014 BEB02
88YTK5431 CLEMS88 H
GH289401 78O
577 UND5543L
5833XR KRNHI
421 I!IL6996
X345JJ COLUM
YTN88 7EW201
88YTK5431 CL
VNN 7W4355*9
Another area of concern is user passwords.
If your UC solution requires user login, then you will want to
ensure that you require strong passwords for your users.
Switchvox, Digium’s UC solution, mitigates both of these threats
by default: strong, unique SIP passwords are automatically
generated and used for Digium phones attached to Switchvox.
Using strong (system) passwords is an
extremely effective, yet often over looked
security measure. Strong passwords
should be used for every instance required
in your UC solution. Business VoIP phones
should especially be protected by unique
strong SIP passwords. Re-used or weak
passwords make it extremely easy for an
attacker to get access to SIP credentials.
Once authenticated with a SIP account,
attackers can make high fee toll calls as
though they were using that phone.
3Use Strong Passwords
A standard security best practice that
is almost universal to all technologies
is to keep software up to date. As well
as obtaining bug fixes, keeping your
software updated helps improve security.
As potential exploits are found, security
patches are then released as software
updates. The most recent version is
typically the most secure.
Whenever you update your UC server you
will want to follow the best practices for
updating. Be aware of what has changed
and how the update could impact your
system; backing up the system first, and
performing the update during a scheduled
maintenance window also helps to ensure
your users will have access to your system
when they need it.
4Update Regularly
Another standard hardening practice
is to turn off any unused services.
A good rule of thumb is that if you aren’t
using a feature you want to shut it down.
This lessens the potential attack surface.
For example, if you are using voice, video
and email communications but aren’t
using chat, then it is best to turn off the
chat functionally in the UC server. Not
only does this improve security, but this
will also improve performance as you will
have less protocol traffic on the network
and your server will be less taxed
because it is doing less work.
5Turn Off Unused Services
Often attacks go unnoticed until a great
amount of damage is done. Regularly
reviewing system logs could allow you to
detect an attack early. Running regular
reports on toll calls can help create a
baseline for normal activity. You’ll then be
able to notice excessive activity.
Sometimes you may be able to enlist
the help of your upstream provider.
They may be able to notify you after a
predetermined limit on toll-based calls
is exceeded. Unfortunately, many
providers do not offer such features.
Instead it is your responsibility to monitor
your logs and ensure that long distance
calls are intended.
6Monitor Your Call Logs
The best way to secure your UC
devices is to use dedicated security
equipment, like VPNs and firewall
routers. However, taking advantage of
built-in security tools can add an extra
level of protection. Digium Switchvox,
for example, comes with security tools
such as Access Control Rules, Automatic
IP blocking and managed tech support
access. The blocked IPs tool will block
IP addresses that fail multiple registration
attempts. In theory, a properly configured
firewall should prevent SIP scanners
from being able to reach your UC server,
however this additional level of security
adds peace of mind and works as a
functional back-up to round out
your security suite.
7Use built-in UC
security tools
Security is your responsibility.
Not all security advice is applicable in all situations.
Discern for yourself whether the information offered
in this eBook is appropriate for your scenario and
make the judgment that is best for you.
Has this eBook been helpful for you?
Share your security concerns and
questions with us on Twitter @Digium
For more information on Unified Communications
solutions, visit www.digium.com/en/solutions
Digium
®
. We’re changing the way businesses communicate.
Want more information
on Switchvox?
Take a virtual tour of
this powerful Unified
Communications platform:
www.digium.com/switchvox
Contact us—
we’re here to help.
Talk with a Switchvox specialist:
1 877 344 4861
1 256 428 6271
sales@digium.com
Founded in 1999, Digium is the creator
and primary developer of Asterisk, the
industry’s first open source telephony
platform. More than one million customers
in 125 countries have deployed Asterisk-
based systems. Digium is committed to
ending the days of expensive, proprietary
telecom. The Switchvox family of Unified
Communications solutions is built on
Asterisk and is designed to provide
enterprise class features at affordable
prices for small and medium businesses.
The award-winning line of Switchvox IP
PBX phone systems provides more than
a phone system—it delivers a Unified
Communications platform that integrates
multiple features that increase productivity
and lower monthly communication costs.
It’s the affordable solution with a proven
return on investment for businesses
with 10 to 400 users.
Learn more at digium.com/switchvox
Copyright©2013 Digium, Inc. All rights reserved. Digium, Asterisk and Switchvox are trademarks of Digium, Inc.
All other trademarks are property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyPatrick Spencer
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-maindsfsadfas
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security MonitoringAnton Goncharov
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 

Mais procurados (19)

Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_story
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
 
A01450131
A01450131A01450131
A01450131
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 

Destaque

Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityHecrocro
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - SecurityRobin Hastings
 
Linked in portfolio
Linked in portfolioLinked in portfolio
Linked in portfolioannadugard
 
Top 10 Reasons SMBs Choose Switchvox
Top 10 Reasons SMBs Choose SwitchvoxTop 10 Reasons SMBs Choose Switchvox
Top 10 Reasons SMBs Choose SwitchvoxDigium
 
The script
The scriptThe script
The scriptStunnah
 
GADO Services Offerings from Rational Lab Services
GADO Services Offerings from Rational Lab ServicesGADO Services Offerings from Rational Lab Services
GADO Services Offerings from Rational Lab ServicesIBM Rational software
 
SOA Suite Administration from OUGN 2014
SOA Suite Administration from OUGN 2014SOA Suite Administration from OUGN 2014
SOA Suite Administration from OUGN 2014Jon Petter Hjulstad
 
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012Napoleon. Raport aktywności branż na Facebooku - sierpień 2012
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012NapoleonCat.com
 
Łódź - doskonałe miasto dla marketing miejsc
Łódź - doskonałe miasto dla  marketing miejscŁódź - doskonałe miasto dla  marketing miejsc
Łódź - doskonałe miasto dla marketing miejscNapoleonCat.com
 
Improving software economics - Top 10 principles of achieving agility at scale
Improving software economics - Top 10 principles of achieving agility at scaleImproving software economics - Top 10 principles of achieving agility at scale
Improving software economics - Top 10 principles of achieving agility at scaleIBM Rational software
 
REST - Why, When and How? at AMIS25
REST - Why, When and How? at AMIS25REST - Why, When and How? at AMIS25
REST - Why, When and How? at AMIS25Jon Petter Hjulstad
 
Combined evaluation
Combined evaluationCombined evaluation
Combined evaluationmitchello44
 
Social Brand Footprint - sierpień 2013
Social Brand Footprint - sierpień 2013Social Brand Footprint - sierpień 2013
Social Brand Footprint - sierpień 2013NapoleonCat.com
 
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012NapoleonCat.com
 
Największe polskie blogi na Facebooku
 Największe polskie blogi na Facebooku Największe polskie blogi na Facebooku
Największe polskie blogi na FacebookuNapoleonCat.com
 
Fitxes castanyada 2010
Fitxes castanyada 2010Fitxes castanyada 2010
Fitxes castanyada 2010espems
 
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, MiamiiDanny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, MiamiiDigium
 

Destaque (20)

Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
SSE Technical Overview
SSE Technical OverviewSSE Technical Overview
SSE Technical Overview
 
Linked in portfolio
Linked in portfolioLinked in portfolio
Linked in portfolio
 
Top 10 Reasons SMBs Choose Switchvox
Top 10 Reasons SMBs Choose SwitchvoxTop 10 Reasons SMBs Choose Switchvox
Top 10 Reasons SMBs Choose Switchvox
 
The script
The scriptThe script
The script
 
GADO Services Offerings from Rational Lab Services
GADO Services Offerings from Rational Lab ServicesGADO Services Offerings from Rational Lab Services
GADO Services Offerings from Rational Lab Services
 
Lideratge 360º
Lideratge 360ºLideratge 360º
Lideratge 360º
 
SOA Suite Administration from OUGN 2014
SOA Suite Administration from OUGN 2014SOA Suite Administration from OUGN 2014
SOA Suite Administration from OUGN 2014
 
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012Napoleon. Raport aktywności branż na Facebooku - sierpień 2012
Napoleon. Raport aktywności branż na Facebooku - sierpień 2012
 
Łódź - doskonałe miasto dla marketing miejsc
Łódź - doskonałe miasto dla  marketing miejscŁódź - doskonałe miasto dla  marketing miejsc
Łódź - doskonałe miasto dla marketing miejsc
 
Improving software economics - Top 10 principles of achieving agility at scale
Improving software economics - Top 10 principles of achieving agility at scaleImproving software economics - Top 10 principles of achieving agility at scale
Improving software economics - Top 10 principles of achieving agility at scale
 
REST - Why, When and How? at AMIS25
REST - Why, When and How? at AMIS25REST - Why, When and How? at AMIS25
REST - Why, When and How? at AMIS25
 
Combined evaluation
Combined evaluationCombined evaluation
Combined evaluation
 
Social Brand Footprint - sierpień 2013
Social Brand Footprint - sierpień 2013Social Brand Footprint - sierpień 2013
Social Brand Footprint - sierpień 2013
 
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012
Napoleon. Raport aktywności branż na Facebooku - kwiecień 2012
 
Największe polskie blogi na Facebooku
 Największe polskie blogi na Facebooku Największe polskie blogi na Facebooku
Największe polskie blogi na Facebooku
 
Fitxes castanyada 2010
Fitxes castanyada 2010Fitxes castanyada 2010
Fitxes castanyada 2010
 
Calleja aira
Calleja airaCalleja aira
Calleja aira
 
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, MiamiiDanny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
 

Semelhante a Security Strategies for UC

Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdfahmed53254
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In BreadthCourtland Smith
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Case Study
Case StudyCase Study
Case Studybogans
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxsusanschei
 

Semelhante a Security Strategies for UC (20)

Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cyber security
Cyber securityCyber security
Cyber security
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Case Study
Case StudyCase Study
Case Study
 
V3I6-0108
V3I6-0108V3I6-0108
V3I6-0108
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docx
 
Network Security
Network SecurityNetwork Security
Network Security
 

Mais de Digium

AstriCon 2017 Recap
AstriCon 2017 RecapAstriCon 2017 Recap
AstriCon 2017 RecapDigium
 
MegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarderMegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarderDigium
 
Becker School District
Becker School DistrictBecker School District
Becker School DistrictDigium
 
AstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell BryantAstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell BryantDigium
 
Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDigium
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTCDigium
 
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...Digium
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System SecureDigium
 
Scaling FastAGI Applications with Go
Scaling FastAGI Applications with GoScaling FastAGI Applications with Go
Scaling FastAGI Applications with GoDigium
 
WebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build SomethingWebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build SomethingDigium
 
Connecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBXConnecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBXDigium
 
The Past and Future of VoIP
The Past and Future of VoIPThe Past and Future of VoIP
The Past and Future of VoIPDigium
 
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)Digium
 
More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.Digium
 
Real Success Stories from IT Heroes
Real Success Stories from IT HeroesReal Success Stories from IT Heroes
Real Success Stories from IT HeroesDigium
 
Smart Deductions for Small Business
Smart Deductions for Small BusinessSmart Deductions for Small Business
Smart Deductions for Small BusinessDigium
 
How to Build Your Brand with UC
How to Build Your Brand with UCHow to Build Your Brand with UC
How to Build Your Brand with UCDigium
 
6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life EasierDigium
 
Switchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified CommunicationsSwitchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified CommunicationsDigium
 
Five Essential Benefits Driving UC Adoption by SMBs
Five Essential Benefits Driving UC Adoption by SMBsFive Essential Benefits Driving UC Adoption by SMBs
Five Essential Benefits Driving UC Adoption by SMBsDigium
 

Mais de Digium (20)

AstriCon 2017 Recap
AstriCon 2017 RecapAstriCon 2017 Recap
AstriCon 2017 Recap
 
MegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarderMegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarder
 
Becker School District
Becker School DistrictBecker School District
Becker School District
 
AstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell BryantAstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell Bryant
 
Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPS
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTC
 
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
Scaling FastAGI Applications with Go
Scaling FastAGI Applications with GoScaling FastAGI Applications with Go
Scaling FastAGI Applications with Go
 
WebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build SomethingWebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build Something
 
Connecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBXConnecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBX
 
The Past and Future of VoIP
The Past and Future of VoIPThe Past and Future of VoIP
The Past and Future of VoIP
 
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
 
More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.
 
Real Success Stories from IT Heroes
Real Success Stories from IT HeroesReal Success Stories from IT Heroes
Real Success Stories from IT Heroes
 
Smart Deductions for Small Business
Smart Deductions for Small BusinessSmart Deductions for Small Business
Smart Deductions for Small Business
 
How to Build Your Brand with UC
How to Build Your Brand with UCHow to Build Your Brand with UC
How to Build Your Brand with UC
 
6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier
 
Switchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified CommunicationsSwitchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified Communications
 
Five Essential Benefits Driving UC Adoption by SMBs
Five Essential Benefits Driving UC Adoption by SMBsFive Essential Benefits Driving UC Adoption by SMBs
Five Essential Benefits Driving UC Adoption by SMBs
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Security Strategies for UC

  • 2. Security Strategies for UC Introduction 3 A History Lesson in Telephony Security 5 Common Threats Against UC Systems 8 UC Security Basics 12 UC Security: What You Need to Know 18
  • 3. In the days of legacy phone systems, voice information was transmitted over the dedicated PSTN (Public Switched Telephone Network). In many ways the PSTN is the largest, most robust communications infrastructure on the planet and it is still in use today. With the advent of VoIP (Voice over IP), telecommunications is moving away from this legacy platform onto the Internet. The SMB business phone system, rather than being separate equipment, is now another network device able to interoperate with many new and emerging technologies. Why is security important in the SMB (small and medium-sized business) space? Security Strategies for UC
  • 4. Security Strategies for Understanding Why UC Systems are Vulnerable A UC business phone system combines voice, video, chat, email and presence together into one unified messaging system. As the technology has become more complex, and more accessible from the public Internet, the security threat has increased. In many ways it is easier than ever to attack business communications. Companies must be diligent to protect their communications as they are vital to business operations.
  • 5. A History Lesson in Telephony Security Security has long been a problem for telecommunications networks. Even in the legacy days of the PSTN, threats existed. Attackers who were able to compromise phone systems were known as “phreaks.” Not all phone phreakers were malicious. Many simply sought to study the technology. A few were able to manipulate the system for financial gain. Early telephone networks used in-band frequencies to transmit call level signaling. For example, AT&T used a single 2600hz tone on the line to signal that the line was ready to dial long distance calls. A famous phone phreaker, John Draper, discovered that the toy whistle found in a Cap’n Crunch ® cereal box could be used to emit a 2600hz tone. By blowing the whistle into the phone, he was able to make free long distance calls. Why is UC Security Important?
  • 6. This vulnerability helped usher in greater use of DTMF (Dual Tone Multi-Frequency) signaling. By using two tones instead of one, the call control signaling was more difficult to reproduce, but not for long. Phreaks soon built devices called the “Blue Box.” This device was able to produce DTMF tones necessary to gain control over the telecommunications system. Steve Wozniak, who later went on to help found Apple Inc., is known for being a phreaker using blue boxes. A History Lesson in Telephony Security
  • 7. To avoid this vulnerability, the telecom network moved to out-of-band signaling; however, DTMF still exists today. The tones you hear when you press the keys on a touch tone phone are DTMF tones. Many mobile and VoIP phones still use these tones simply because they are familiar to us, even though they are not needed for signaling. The historical lesson to learn is that technology must evolve to stay ahead of those who seek to exploit it. Although historical phreaks like John Draper and Steve Wozniak are a type of folk hero, modern attackers can do real damage to your system and cost your business large amounts of money. As technologies evolve, so do the malicious attackers. It is imperative to stay up-to-date on information security in order to protect your business’ assets. A History Lesson in Telephony Security
  • 8. Toll Fraud Toll Fraud is a common attack against business phone systems. In this type of attack the malicious agent attempts to gain access to your long-distance, toll-bearing trunks. If they are able to make calls using your long-distance account then they can get free calls and you end up paying long distance fees to your upstream provider. This can be especially damaging if international calls are made. Companies with VoIP systems that are compromised by toll fraud are often left liable for tens of thousands, or even hundreds of thousands of dollars in long distance fees. There are many threats that can affect a business phone system. Four of the most popular are: Toll Fraud, Denial of Service, Man in the Middle, and Social Engineering. Knowing what kind of damage can be done serves to illustrate the importance of securing your phone system. Common threats against UC systems
  • 9. Denial of Service A “DoS” or Denial of Service attack is one in which an attacker compromises your system in such a way as to make it inaccessible to your users. DoS attacks can be targeted at specific services, such as stopping the ability to dial out trunks, or access to remote UC features, or in a worst case scenario, can bring down the entire system so that even interoffice calls cannot be made. When your system is unavailable to users due to a DoS attack you will see this cost in terms of lost time and productivity. Not to mention the loss of reputation in the eyes of your customers who are unable to communicate with you. Common threats
  • 10. Man in the Middle A Man in the Middle attack occurs when an attacker is able to intercept your traffic and then passes it along. You may not know that a Man in the Middle attack is occurring because your services appear to be working like normal. However, if an attacker is able to intercept authentication credentials they could use this information to perform a DoS or Toll Fraud attack. Additionally, the attacker could gain access to private or privileged information. Common threats
  • 11. Common threats Social Engineering The easiest way to exploit a technology is to attack humans instead of attacking the technology. Modern, sophisticated attackers will often try to gain access to your system via social engineering rather than technical exploits. An example would be a malicious attacker calling one of your users pretending to be your IT department. They might ask the user for their password in order to fix an imaginary problem. The unsuspecting user offers their authentication credentials freely. The attacker now has access to your system.
  • 12. UC Security Basics It’s important to understand some common terminology you’ll hear referenced when talking security. For example, the acronym CIA (Confidentiality, Integrity and Availability) is used to describe the desirable attributes of an effective information security implementation. As you read the rest of the terms and their descriptions below, think about how each of these concepts apply to your business.
  • 13. UC Security Basics Confidentiality User data should be confidential. The only people who should be able to access your confidential information are those for whom it is intended. In the case of business Unified Communications (UC) systems the data could be voice traffic or chat messages. Confidentiality is important both to protect trade secrets and personal privacy. In the same way you might close your office door in order to have a confidential conversation, you would likewise expect that a phone call between two parties would be similarly private. You would not want an uninvited third party to be able to eavesdrop on the conversation.
  • 14. Integrity The integrity of information refers to the quality being unchanged. If you receive an email from a colleague, you should have a reasonable expectation that the text you are reading is the actual message they sent. A malicious attacker intercepting your message and modifying it could cause havoc.
  • 15. Availability Having a secure network with confidentiality and integrity is of little value if your services are unavailable to your users. A DoS (Denial of Service) attack is one in which an attacker prevents access. For example, imagine an attacker who gains physical access to your server closet and disconnects the power to your UC server. The disruption to your phone service would impact your ability to provide customer service.
  • 16. Availability Availability is also important to keep in mind when selecting security equipment. There is a such thing as “too much security.” For example, imagine you wanted to secure the hard disk of your PC. You could remove the disk, encase it in cement and bury it in the ground. The data on the disk would be highly confidential—no unauthorized person would be able to get to it. It would have high integrity, and be nearly impossible for an attacker to modify the data on the disk. However, it would also be completely unavailable and as such this security tactic is a futile one. It may seems obvious that “cement” is a poor choice for securing UC equipment, however often the same type of over-handed security polices are put in place, making the data so “secure” no one can get to it, even your users.
  • 17. Mitigation vs Elimination A truly secure network is one that is not only protected from attack but is also accessible when it needs to be. In this spirit, the goal of information security should be mitigation not elimination. To “mitigate” a threat means “to lessen or make smaller.” It’s never possible to completely eliminate all threats against your UC system. If an attacker is determined enough they will find a way to break in to your system, however most attackers are not determined. In general VoIP security threats most commonly arise from attackers looking for an easy, unsecured target. By implementing a baseline of security best practices you make your system unattractive to potential attackers looking for an easy target.
  • 18. UC Security: What You Need to Know In particular, securing VoIP networks is not the same as securing data networks. Most data traffic is transported over TCP and as such, security built-in to networking devices such as routers and firewalls are built around TCP data-centric transport. VoIP is UDP-based and time sensitive. Dropping a few packets while downloading a website is for the most part benign—the packets can simply be retransmitted. Voice and video streams are more fragile. Dropping too many UDP packets in a voice stream can cause call quality issues. As such, securing your unified communications requires a balanced approach. You must mitigate threats while also maintaining quality of service. Likewise, managing security for an SMB offers unique challenges when compared to the larger, enterprise space. While large businesses can often dedicate substantial resources toward securing their communications, those in the SMB space need security solutions that are both effective and simple. This actually works in favor of the SMBs since security and simplicity can work together. For example, installing an expensive and complex solution to secure you network can work against you. Improperly configured equipment can affect your call quality and potentially stop your VoIP equipment from functioning properly. Remember, accessibility is key to a secure network. Unified communications presents unique security challenges because it brings together disparate technologies. Using VoIP, video, chat and presence together has proven to provide productivity gains for businesses, but also presents security risks.
  • 19. 1. Deploy a Properly Configured Firewall 2. Enable a VPN for Remote Users 3. Use Strong Passwords 4. Update Regularly 5. Turn Off Unused Services 6. Monitor Your Call Logs 7. Use built-in UC security tools 7 Tips for Effective UC Security Despite being in a niche field, securing unified communications as an SMB follows many of the same security best practices that are effective in the enterprise for a variety of technologies. The following best practices can help keep communications flowing.
  • 20. Due to the variety of firewall models and topologies available, giving specific advice is difficult. So, here are some practical tips for almost any configuration. For starters, it’s always advisable to keep high importance on security. This means being technically familiar with your equipment and it’s configuration. It is a responsibility you should take with the utmost seriousness. When shopping for firewalls favor those that offer simple configuration and are designed for the SMB. 1Deploy a Properly Configured Firewall
  • 21. A good general rule of thumb is to block all unknown traffic into your network and then only allow traffic from trusted sources. This strategy doesn’t usually work well for your web server, but your UC server should absolutely be sequestered behind your firewall. In most cases, you should only allow Internet traffic from your ITSP (Internet Telephony Service Providor) or VoIP provider. This is the company that supplies you SIP truck or hosted VoIP services. Allow access only on the ports necessary and only to the IP or block of IPs that your provider uses. 1Deploy a Properly Configured Firewall
  • 22. Some complex firewalls tout features such as SIP ALG (Application Level Gateway). Although SIP ALG is advertised as a security feature for VoIP, it tends to not work as advertised. Instead, ALGs have a tendency to mangle SIP packets or modify headers in a way that breaks functionality. A general best practice is to do extensive interoperability testing prior to deployment or simply disable SIP ALG in your firewall and/or router. 1Deploy a Properly Configured Firewall
  • 23. Surprisingly enough, many small, and even medium-sized businesses do not deploy a firewall. Or, they deploy a firewall, but open ports to all networks to allow remote users. This is almost the same as having no firewall at all. Although some UC servers, like Switchvox have built-in attack mitigation mechanisms, these should not be solely relied upon. Your firewall is designed to sort traffic, your UC server is not. Using each device for its intended purpose will keep your network the most secure. In the SMB, managing remote users is better done through a VPN. 1Deploy a Properly Configured Firewall
  • 24. VPN stands for Virtualized Private Network. Many SMB networking devices, such as routers and firewalls, come with built-in VPN capability. Quality VPN devices are now available at affordable prices. For your remote users, and while connecting remote SMB offices, the simplest option is to deploy a VPN device at both ends. The connected devices form an encrypted “tunnel” over the public Internet. This “virtual” network keeps all of your traffic safe. VPNs have many benefits: 1. In addition to VoIP, the remote user can access other local network resources such as network shares and intranet web applications. 2. The traffic is encrypted to maintain privacy 3. NAT issues are eliminated or diminished 4. Also, there are only a few ports to open in the firewall to allow the VPN traffic. They can be opened to all networks because the VPN requires authentication before establishing a connection. 2Enable a VPN for remote users
  • 25. GH289401 78OLN23 NE 577 UND5543L12 B16D 5833XR KRNHI6 AXE29 421 I!IL69960 3DF3D X345JJ COLUMB#4 28D YTN88 7EW2014 BEB02 88YTK5431 CLEMS88 H GH289401 78O 577 UND5543L 5833XR KRNHI 421 I!IL6996 X345JJ COLUM YTN88 7EW201 88YTK5431 CL VNN 7W4355*9 Another area of concern is user passwords. If your UC solution requires user login, then you will want to ensure that you require strong passwords for your users. Switchvox, Digium’s UC solution, mitigates both of these threats by default: strong, unique SIP passwords are automatically generated and used for Digium phones attached to Switchvox. Using strong (system) passwords is an extremely effective, yet often over looked security measure. Strong passwords should be used for every instance required in your UC solution. Business VoIP phones should especially be protected by unique strong SIP passwords. Re-used or weak passwords make it extremely easy for an attacker to get access to SIP credentials. Once authenticated with a SIP account, attackers can make high fee toll calls as though they were using that phone. 3Use Strong Passwords
  • 26. A standard security best practice that is almost universal to all technologies is to keep software up to date. As well as obtaining bug fixes, keeping your software updated helps improve security. As potential exploits are found, security patches are then released as software updates. The most recent version is typically the most secure. Whenever you update your UC server you will want to follow the best practices for updating. Be aware of what has changed and how the update could impact your system; backing up the system first, and performing the update during a scheduled maintenance window also helps to ensure your users will have access to your system when they need it. 4Update Regularly
  • 27. Another standard hardening practice is to turn off any unused services. A good rule of thumb is that if you aren’t using a feature you want to shut it down. This lessens the potential attack surface. For example, if you are using voice, video and email communications but aren’t using chat, then it is best to turn off the chat functionally in the UC server. Not only does this improve security, but this will also improve performance as you will have less protocol traffic on the network and your server will be less taxed because it is doing less work. 5Turn Off Unused Services
  • 28. Often attacks go unnoticed until a great amount of damage is done. Regularly reviewing system logs could allow you to detect an attack early. Running regular reports on toll calls can help create a baseline for normal activity. You’ll then be able to notice excessive activity. Sometimes you may be able to enlist the help of your upstream provider. They may be able to notify you after a predetermined limit on toll-based calls is exceeded. Unfortunately, many providers do not offer such features. Instead it is your responsibility to monitor your logs and ensure that long distance calls are intended. 6Monitor Your Call Logs
  • 29. The best way to secure your UC devices is to use dedicated security equipment, like VPNs and firewall routers. However, taking advantage of built-in security tools can add an extra level of protection. Digium Switchvox, for example, comes with security tools such as Access Control Rules, Automatic IP blocking and managed tech support access. The blocked IPs tool will block IP addresses that fail multiple registration attempts. In theory, a properly configured firewall should prevent SIP scanners from being able to reach your UC server, however this additional level of security adds peace of mind and works as a functional back-up to round out your security suite. 7Use built-in UC security tools
  • 30. Security is your responsibility. Not all security advice is applicable in all situations. Discern for yourself whether the information offered in this eBook is appropriate for your scenario and make the judgment that is best for you. Has this eBook been helpful for you? Share your security concerns and questions with us on Twitter @Digium For more information on Unified Communications solutions, visit www.digium.com/en/solutions
  • 31. Digium ® . We’re changing the way businesses communicate. Want more information on Switchvox? Take a virtual tour of this powerful Unified Communications platform: www.digium.com/switchvox Contact us— we’re here to help. Talk with a Switchvox specialist: 1 877 344 4861 1 256 428 6271 sales@digium.com Founded in 1999, Digium is the creator and primary developer of Asterisk, the industry’s first open source telephony platform. More than one million customers in 125 countries have deployed Asterisk- based systems. Digium is committed to ending the days of expensive, proprietary telecom. The Switchvox family of Unified Communications solutions is built on Asterisk and is designed to provide enterprise class features at affordable prices for small and medium businesses. The award-winning line of Switchvox IP PBX phone systems provides more than a phone system—it delivers a Unified Communications platform that integrates multiple features that increase productivity and lower monthly communication costs. It’s the affordable solution with a proven return on investment for businesses with 10 to 400 users. Learn more at digium.com/switchvox Copyright©2013 Digium, Inc. All rights reserved. Digium, Asterisk and Switchvox are trademarks of Digium, Inc. All other trademarks are property of their respective owners.