{"id":124,"date":"2006-03-21T00:00:00","date_gmt":"2006-03-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/21\/voip-security-at-odds-with-qos\/"},"modified":"2021-12-30T11:36:34","modified_gmt":"2021-12-30T11:36:34","slug":"voip-security-at-odds-with-qos","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/21\/voip-security-at-odds-with-qos\/","title":{"rendered":"VoIP security at odds with QoS"},"content":{"rendered":"<p>Network managers need to start thinking very carefully about implementing voice over IP (VoIP) security to maintain LAN performance, avoid denial of service (DoS) attacks on IP phones and software platforms, and stop hackers listening in to private conversations.  Speaking at a roundtable forum at Cebit this month, experts said it could take another two years before the right balance of security and quality of service (QoS) in enterprise VoIP systems can be found.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We have to follow standards and listen to news groups.  Adding encryption to prevent outsiders listening into conversations can also degrade performance.<\/p>\n<p>&#8220;Providing QoS to use limited bandwidth but still encrypt data limits the ability to analyse what application is running, or decide what QoS should apply, &#8221; said Gilad Brand, director of product management at VoIP gateway specialist Jungo.<\/p>\n<p>SIP is an open standard that should help to address the security versus performance issue, but vendors&#8217; implementations of the technology differ, so interoperability and uniform feature sets are not assured in the short term, said Slaby.<\/p>\n<p>http:\/\/www.vnunet.com\/2152383<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-124","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"predecessor-version":[{"id":2611,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/124\/revisions\/2611"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}