Risk management of VoIP implementation

نویسندگان

  • Tian Gerber
  • Kerry-Lynn Thomson
چکیده

Corporate governance is generally regarded as the means by which an organization should be directed and controlled. According to good corporate governance practices, an organization should maintain a competitive advantage by securing its assets and protecting against new threats introduced through new technologies. An example of a new technology that is being increasingly implemented in organizations is that of Voice over Internet Protocol (VoIP). VoIP is typically seen as a replacement for the Public Switched Telephone Network (PSTN) and converts analog voice into digital voice packets for transport on computer networks. VoIP implementations are on the increase due to its many benefits. However, the focus of VoIP implementations is typically on the advantages and not on potential risks. This oversight could affect corporate governance as due care and due diligence may not be assured. This paper will investigate a possible way of making organizations aware of these information security risks through the development of a VoIP Risk Table, which will correlate the risks, threats, likely impact, recommendations and COBIT 5 process practices related to VoIP by means of a qualitative content analysis. This table could assist organizations with proper risk management for VoIP implementations enabling organizations to take the necessary steps to mitigate risks and ensure better governance of VoIP technologies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Managing Risks at Runtime in VoIP Networks and Services

IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and aut...

متن کامل

A Case of VoIP Implementation at A Financial Services Office

Customer service and customer retention are critical to an organization’s success in the service sector. In the Midwest retail office of Anthem Consultants, the old PBX system was incapable of handling customer inquires during the busy tax return season. The inefficient systems exposed the organization to missed and delayed calls, which lead to a considerable number of customer complaints and l...

متن کامل

SIP Signaling Implementations and Performance Enhancement over MANET: A Survey

The implementation of the Session Initiation Protocol (SIP)-based Voice over Internet Protocol (VoIP) and multimedia over MANET is still a challenging issue. Many routing factors affect the performance of SIP signaling and the voice Quality of Service (QoS). Node mobility in MANET causes dynamic changes to route calculations, topology, hop numbers, and the connectivity status between the corres...

متن کامل

Econometric Feedback for Runtime Risk Management in VoIP Architectures

VoIP infrastructures are exposed to a large variety of security attacks, but the deployment of security safeguards may deteriorate their performance. Risk management provides new perspectives for addressing this issue. Risk models permit to reduce these attacks while maintaining the quality of such a critical service. These models often suffer from their complexity due to the high number of par...

متن کامل

A Fuzzy AHP-TOPSIS Framework for the Risk Assessment of Green Supply Chain Implementation in the Textile Industry

In the emerging supply chain environment, green supply chain risk management plays a significant role than ever. Risk is an inherent uncertainty and has tendency to disrupt the typical green supply chain management (GSCM) operations and eventually reduce the success rate of industries. In order to mitigate the consequences, a fuzzy multi-criteria group decision making modeling (FMCGDM) which co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013