Voice over Internet Protocol (VoIP)
DHS 4300A Sensitive Systems Handbook
Attachment Q5
To Handbook v. 11.0
Voice over Internet Protocol (VoIP)
Version 11.0 December 22, 2014
Protecting the Information that Secures the Homeland
DHS 4300A SENSITIVE SYSTEMS HANDBOOK
ATTACHMENT Q5 ? VOICE OVER IP
This page intentionally blank
V11.0, December 22, 2014
ii
DHS 4300A SENSITIVE SYSTEMS HANDBOOK
ATTACHMENT Q5 ? VOICE OVER IP
Document Change History
Version
HB version 11.0
Date
December 22, 2014 New document.
Description
V11.0, December 22, 2014
iii
DHS 4300A SENSITIVE SYSTEMS HANDBOOK
ATTACHMENT Q5 ? VOICE OVER IP
CONTENTS
1.0 INTRODUCTION ..........................................................................................................................................................1 1.1 Purpose and Scope.........................................................................................................................................................1 1.2 VoIP Security Requirements Checklist............................................................................................................................1
2.0 VoIP System Overview................................................................................................................................................1 2.1 VoIP System Architecture ..............................................................................................................................................1 2.2 Federal Guidance and Polices........................................................................................................................................2
3.0 THREAT OVERVIEW ....................................................................................................................................................3 3.1 VoIP Threats and Vulnerabilities..................................................................................................................................3 3.1.1 Eavesdropping......................................................................................................................................................3 3.1.2 Network Vulnerabilities .......................................................................................................................................4 3.1.3 Software Flaws and malware...............................................................................................................................4 3.1.4 Other Voice Service Related Threats ...................................................................................................................4
4.0 SECURING VoIP COMPONENTS...................................................................................................................................4 4.1 VoIP Security Mechanisms.............................................................................................................................................5 4.2 Authentication...............................................................................................................................................................5 4.3 Virus Protection .............................................................................................................................................................5 4.4 Disabling Undesirable VoIP Features.............................................................................................................................5 4.5 Monitoring of System Configuration Change ................................................................................................................5
5.0 SECURING VoIP Networks...........................................................................................................................................5 5.1 Voice and Data Separation............................................................................................................................................6 5.2 Data Protection .............................................................................................................................................................6 5.3 Firewalls.........................................................................................................................................................................6 5.4 URL ................................................................................................................................................................................6 5.5 Logs................................................................................................................................................................................6 5.6 Configuration Control ....................................................................................................................................................6 5.7 Physical Security ............................................................................................................................................................7 5.8 Security Assessment ......................................................................................................................................................7 5.9 Security Incident Response ............................................................................................................................................7
6.0 Communication Service Convergence ? Unified Communications ..............................................................................7
V11.0, December 22, 2014
iv
DHS 4300A SENSITIVE SYSTEMS HANDBOOK
ATTACHMENT Q5 ? VOICE OVER IP
Appendix A: Checklist for Securing VoIP Systems...............................................................................................................9 Appendix B: Referenced Publications .............................................................................................................................. 12 Appendix C: Acronyms and Definitions ............................................................................................................................ 13
V11.0, December 22, 2014
v
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
Related searches
- aip protocol food list printable
- betadine protocol viral conjunctivitis
- aip protocol food list
- autoimmune protocol diet print out
- autoimmune protocol food list
- sample protocol template
- time out protocol in surgery
- crps physical therapy protocol pdf
- joint commission universal protocol checklist
- xfinity voice and internet bundle
- xfinity voice and internet only
- comcast internet and voice deals