Security for unified communications: [Essay Example], 528 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Security for Unified Communications

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

As organizations started relying more on unified communications, the management of voice, video and messaging through one unified system has developed concern about the security of this IP-based communications infrastructure. This has happened due to the fact that UC is IP-based but there are so many potential modes of communication, from video, instant messaging and Web collaboration to presence, e-mail and voice mail. With time we find that the situation has developed proliferation of mobile devices that are being used more frequently in the business environments and devices that are not as secure as those housed in the business environment organization (Manyika, Chui, Brown, Bughin, Dobbs, Roxburgh, & Byers, 2011).

The most security concern in UC is eavesdropping. This is the idea that external parties can infiltrate the IP connection to eavesdrop on a Web conference, receive instant message exchange or other communication medium. Therefore, the biggest concern is when organizations extend their UC capabilities beyond boundaries that is to the external partners. Additionally, SIP trunking is another service that allows organizations to use voice over IP through the Internet connection. This has created a lot of concern when the organization moves from a digital connection to an IP-based connection so as to receive and make phone calls concerning hacking raises. The best way to mitigate this concern is to make sure that the system includes SIP-aware firewalls or session border control as the protective mechanisms. In addition to this, there are many products in the SIP security market that will help mitigate risks.

Another growing concern is denial of service this is an attack method most often identified with the Internet although it has become a growing threatto UC. This has caused the proliferation of mobile devices in the workforce that has caused the newest entrant into the UC infrastructure. With this, there is a valuable addition, allowing workers to participate in meetings and collaborative activities from wherever they are, but they also present challenges. In most organizations, it allows employees to use their own cell phones, for instance, there is worry about protection of password as well as how to wipe the data from the phone when it is lost, and how to make sure call data records aren’t compromised.

For the device, best practices include shutting down unused services and ports and changing default passwords. For the network, best practices include deploying firewalls, router access control lists, virtual local-area networks, port-level switch security and authenticated network access. Securely authenticate all mobile users of organizational assets. Implement remote security management. Implement end-to-end message and data encryption. Install remote device lock and remote device kill in case of theft or loss.

Other proactive moves include implementing host- and network-based intrusion detection and intrusion prevention systems or proxy servers to protect SIP trunking. Although, security for UC has come a long way in the past few years, it is getting better. The SIP security capabilities is not only much improved, but there is a lot of interest around security certificate authentication mechanisms. With this in place, users placing a call over an IP network would be able to validate the identity of the person on the other end (Bradley, & Shah, 2010).

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Security for unified communications. (2019, Jan 15). GradesFixer. Retrieved September 26, 2020, from https://gradesfixer.com/free-essay-examples/security-for-unified-communications/
“Security for unified communications.” GradesFixer, 15 Jan. 2019, gradesfixer.com/free-essay-examples/security-for-unified-communications/
Security for unified communications. [online]. Available at: <https://gradesfixer.com/free-essay-examples/security-for-unified-communications/> [Accessed 26 Sept. 2020].
Security for unified communications [Internet]. GradesFixer. 2019 Jan 15 [cited 2020 Sept 26]. Available from: https://gradesfixer.com/free-essay-examples/security-for-unified-communications/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.