close
test_template

Security for Unified Communications

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 528 |

Page: 1|

3 min read

Published: Jan 15, 2019

Words: 528|Page: 1|3 min read

Published: Jan 15, 2019

As organizations started relying more on unified communications, the management of voice, video and messaging through one unified system has developed concern about the security of this IP-based communications infrastructure. This has happened due to the fact that UC is IP-based but there are so many potential modes of communication, from video, instant messaging and Web collaboration to presence, e-mail and voice mail. With time we find that the situation has developed proliferation of mobile devices that are being used more frequently in the business environments and devices that are not as secure as those housed in the business environment organization (Manyika, Chui, Brown, Bughin, Dobbs, Roxburgh, & Byers, 2011).

The most security concern in UC is eavesdropping. This is the idea that external parties can infiltrate the IP connection to eavesdrop on a Web conference, receive instant message exchange or other communication medium. Therefore, the biggest concern is when organizations extend their UC capabilities beyond boundaries that is to the external partners. Additionally, SIP trunking is another service that allows organizations to use voice over IP through the Internet connection. This has created a lot of concern when the organization moves from a digital connection to an IP-based connection so as to receive and make phone calls concerning hacking raises. The best way to mitigate this concern is to make sure that the system includes SIP-aware firewalls or session border control as the protective mechanisms. In addition to this, there are many products in the SIP security market that will help mitigate risks.

Another growing concern is denial of service this is an attack method most often identified with the Internet although it has become a growing threatto UC. This has caused the proliferation of mobile devices in the workforce that has caused the newest entrant into the UC infrastructure. With this, there is a valuable addition, allowing workers to participate in meetings and collaborative activities from wherever they are, but they also present challenges. In most organizations, it allows employees to use their own cell phones, for instance, there is worry about protection of password as well as how to wipe the data from the phone when it is lost, and how to make sure call data records aren’t compromised.

For the device, best practices include shutting down unused services and ports and changing default passwords. For the network, best practices include deploying firewalls, router access control lists, virtual local-area networks, port-level switch security and authenticated network access. Securely authenticate all mobile users of organizational assets. Implement remote security management. Implement end-to-end message and data encryption. Install remote device lock and remote device kill in case of theft or loss.

Get a custom paper now from our expert writers.

Other proactive moves include implementing host- and network-based intrusion detection and intrusion prevention systems or proxy servers to protect SIP trunking. Although, security for UC has come a long way in the past few years, it is getting better. The SIP security capabilities is not only much improved, but there is a lot of interest around security certificate authentication mechanisms. With this in place, users placing a call over an IP network would be able to validate the identity of the person on the other end (Bradley, & Shah, 2010).

Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

Security for Unified Communications. (2019, January 15). GradesFixer. Retrieved November 20, 2024, from https://gradesfixer.com/free-essay-examples/security-for-unified-communications/
“Security for Unified Communications.” GradesFixer, 15 Jan. 2019, gradesfixer.com/free-essay-examples/security-for-unified-communications/
Security for Unified Communications. [online]. Available at: <https://gradesfixer.com/free-essay-examples/security-for-unified-communications/> [Accessed 20 Nov. 2024].
Security for Unified Communications [Internet]. GradesFixer. 2019 Jan 15 [cited 2024 Nov 20]. Available from: https://gradesfixer.com/free-essay-examples/security-for-unified-communications/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now