Description: C:\Users\Gimode\Desktop\LOGO\CAK LOGO-01.jpg

National KE-CIRT/CC Cybersecurity Best Practice Guide of the Week



In This Issue:

* VOIP Security Threats















/Users/timothy/_ke-cirt/Security Tips/Security Tips/VOIP_SECURITY_THREATS_files/image003.jpg


VoIP - (Voice over Internet Protocol) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.


Risks Associated with VOIP & How to Protect Yourself


Here are some of the threats VoIP users face:


1.  Call Hijacking & VoIP Tampering: These attacks involve the transmission of noise packets to interrupt the stream of communications and cause reduced call quality, dropped calls, and delays in voice signal.

2.  Man-in-the-middle attacks VoIP - is particularly vulnerable to man-in-the-middle attacks, in which the attacker intercepts call-signaling SIP message traffic and masquerades as the calling party to the called party, or vice versa. Once the attacker has gained this position, he can hijack calls via a redirection server.

3.  Identity and service theft - which can result from cyber criminals gathering bits of information collected from your conversations.

4.  Vishing - Vishing is another word for VoIP Phishing, which involves a party calling you faking a trustworthy organization (e.g. your bank) and requesting confidential and often critical information.

5.  Viruses and malware like DoS (Denial of Service) - In this type of attack, hackers use information overload to flood a network server and consume all available bandwidth. This prevents incoming and outgoing VoIP calls and gives hackers the opportunity to gain remote control of administrative servers.

6.  SPIT (Spamming over Internet Telephony) - Every VoIP account has an associated IP address. It is easy for spammers to send their messages (voicemails) to thousands of IP addresses. Voice mailing as a result will suffer.



What are the solutions?


1.  Deep Packet Inspection (DPI)

-      DPI locates, identifies, and classifies data packets through filtering. It can reroute or block incoming packets with unidentified code or forbidden data, deterring unauthorized use of the wide area, local area, or VoIP network. VoIP providers also use DPI to improve network performance and prevent peer-to-peer abuse that may result from VoIP fraud.

2.  Antivirus Software

-      Because VoIP softphones are part of office computer systems, protecting them from viruses and other dangerous third-party programs is critical. VoIP vendors or network providers should offer antivirus protection, also known as unified threat management software, as part of their service offerings.

3.  Perform a security audit ahead of any VoIP implementation or systems upgrade.

4.  Authentication Protocols

-      VoIP authentication protocols vary based on the type of data being transported. They range from a typical password authentication procedure to a complex three-way authentication process that protects servers and business VoIP.

5.  Session Border Controllers

-      These VoIP network devices control media streams and protocol signals. They start, conduct, and stop VoIP voice calls and adhere to quality-of-service protocols to ensure the safety and best possible voice quality of all VoIP calls.

6.  Authorization Policies & Call Restrictions

-      A simple way for businesses to secure VoIP lines is simply by regulating their own people and policies. They can perform audits and create call restrictions to track VoIP activity and then monitor accordingly to prevent access by unauthorized parties.



Have the above security tips in mind when operating your computer systems. Report any cybercrime incident/activity

to /

/Users/timothy/_ke-cirt/Security Tips/Security Tips/VOIP_SECURITY_THREATS_files/image004.png/Users/timothy/_ke-cirt/Security Tips/Security Tips/VOIP_SECURITY_THREATS_files/image005.png/Users/timothy/_ke-cirt/Security Tips/Security Tips/VOIP_SECURITY_THREATS_files/image006.png