Business Phone Security. Threats to VoIP and What to do about Them



Similar documents
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

VOIP SECURITY ISSUES AND RECOMMENDATIONS

COSC 472 Network Security

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Voice over IP Security

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Voice Over IP and Firewalls

Security Issues with Integrated Smart Buildings

Recommended IP Telephony Architecture

Best Practices for Securing IP Telephony

Security and Risk Analysis of VoIP Networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Voice Over IP (VoIP) Denial of Service (DoS)

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

Threat Mitigation for VoIP

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Chap. 1: Introduction

Cyber Security: Beginners Guide to Firewalls

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Chapter 7 Information System Security and Control

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

An outline of the security threats that face SIP based VoIP and other real-time applications

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Domain 6.0: Network Security

E-BUSINESS THREATS AND SOLUTIONS

Network Security - ISA 656 Review

A Reality Check on Security in VoIP

Ingate Firewall/SIParator SIP Security for the Enterprise

Network Security and the Small Business

SPAM FILTER Service Data Sheet

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Securing VoIP Networks using graded Protection Levels

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Section 12 MUST BE COMPLETED BY: 4/22

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

CS5008: Internet Computing

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Basic Vulnerability Issues for SIP Security

Guidance Regarding Skype and Other P2P VoIP Solutions

Chapter 6: Fundamental Cloud Security

1. Firewall Configuration

Strategies to Keep Your VoIP Network Secure

VOICE OVER IP SECURITY

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

TELE 301 Network Management. Lecture 18: Network Security

Deploying Firewalls Throughout Your Organization

Content Teaching Academy at James Madison University

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

VoIP Security Threats and Vulnerabilities

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

Overview of computer and communications security

VoIP Survivor s s Guide

Top tips for improved network security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

National Cyber Security Month 2015: Daily Security Awareness Tips

Villains and Voice Over IP

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Recommendations for secure deployment of an IP-PBX

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Remote Access Security

Safeguards Against Denial of Service Attacks for IP Phones

SIP Trunking Configuration with

11 NETWORK SECURITY PROJECTS. Project Understanding Key Concepts. Project Using Auditing and Event Logs. Project 11.3

SS7 & LTE Stack Attack

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Threats to be considered (1) ERSTE GROUP

Achieving PCI Compliance Using F5 Products

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Next Gen Firewall and UTM Buyers Guide

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

VoIP Security. Customer Best Practices Guide. August IntelePeer

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

TLP WHITE. Denial of service attacks: what you need to know

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

SHORT MESSAGE SERVICE SECURITY

Securing Unified Communications for Healthcare

Transcription:

Business Phone Security Threats to VoIP and What to do about Them

VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services are vulnerable to exploitation by unscrupulous individuals who wish to do everything from committing call fraud on your VoIP service account to completely shutting down your communications server. VoIP security measures are still in development, and while they may have come quite a way from using unencrypted or plain script log in name and password procedures, there is still a lot of work to be done before a fool-proof security protocol is in place for VoIP systems. To protect your business from VoIP threats, you must know what they are. Here s a list of the most common VoIP security threats: Denial of Service Attacks Call Fraud Eavesdropping Phreaking Call Hijacking Malware and Viruses Denial of Service Attack Hackers and unscrupulous individuals can literally bring a business s website or VoIP service to a complete halt with a Denial of Service (DoS) attack. A DoS attack is when a network or server is overloaded or flooded with information and data packets. This consumes all of the servers available bandwidth, and prevents incoming and outgoing VoIP calls from occurring. A VoIP server overload, for instance, is done by flooding the service with Session Initiation Protocol (SIP) call-signaling messages. With VoIP, the more bandwidth that is used up, the lower the quality of the call. When this happens, voice signals can halt, or it can cause jitter, or worse, drop business calls all together. Business Phone Security Compare Business Products 2013 2

Once the system is completely over taken by the DoS attack, a hacker can gain remote control of a mainframe, or administrative servers and cause all sorts of problems for a business, from credit card theft to abusing the VoIP services to make expensive phone calls on your business s service account. VoIP Call Fraud Call fraud, in it s simplest form, involves someone tapping into a VoIP line and using it to make unauthorized calls. There are two main types of call fraud; eavesdropping, and phreaking. Eavesdropping Eavesdropping is when hackers tap into VoIP phone calls and listen in to get the names of employees, their passwords, phone numbers, and other information that they use to gain access to voice mail, calling plan information, and billing information. Eavesdropping on VoIP calls is used in identity theft, VoIP service theft (also called VoIP fraud), and corporate sabotage. Phreaking Phreaking is the process of illegitimately gaining access to a business s VoIP service provider information, including account numbers, access codes and so on, and illegitimately adding phone lines to make phone calls, or making calls on existing business VoIP lines and racking up a huge provider bill. Man-in-the-Middle Attack In a man-in-the-middle attack, a hacker has a program that acts as the client s server, and also tells the server that it is the client, so that they can intercept all incoming data packets. This allows a hacker to get a hold of a voice message or other information sent via VoIP and change it prior to retransmitting it. Business Phone Security Compare Business Products 2013 3

VoIP Tampering and Call Hijacking VoIP call tampering is when data packets, called noise packets, are sent to interrupt the communication stream, causing poor call quality, dropped calls, and delays in voice signal. VoIP call signals can be intercepted by a third party, who then changes the encryption key of the digital signature of the call, to their own public key. Doing so tricks the servers into thinking that the two original parties of the VoIP call are still in communication, and allows the hacker to cause serious communication problems. This is also some times called Phishing over VoIP. Malware, Worms, and Viruses Since VoIP uses software and soft phones, it is vulnerable to attack by malware, or malicious software, worms, and other computer program viruses. These viruses are often used to enslave a computer system so that the third party can use it to send spam email or other types of malicious data. Some worms outright destroy information and make it impossible to recover, or they can trace key strokes or data entry,and send this information to a third party which uses it to gain remote access to a business computer or phone system, where they can copy sensitive files, get credit card numbers, and so on. VoIP Security Measures Encryption Most VoIP providers offer secure encryption services. To get the best use out of encryption software, make sure that password and encryption measures are enabled on your business s VoIP. These types of encryption codes are called authentication protocols. Authentication Protocols VoIP Authentication protocols run from the typical password authentication procedure to a complex three-way authentication process that protects the server and the business using VoIP from malicious attacks. Business Phone Security Compare Business Products 2013 4

Password Authentication Procedure (PAP), also called the Two-way Handshake, sends a password across an Internet link. Essentially it tells the authenticator program of the server the user name and password entered by the end user. If the password matches what the server has on file, access is granted and a VoIP phone call can take place. If the password doesn t match, the server rejects the request and access to starting a VoIP call is denied. PAP is a simple two-way protocol that can easily be exploited due to the fact that often the user name and password aren t suitably disguised, or encrypted by applications prior to the information being sent to the server in a data packet. Challenge, Handshake Authentication Protocol (CHAP) The calling client (the person s computer or soft phone that is initializes a VoIP call by sending out data) links with the authenticator application located in the VoIP server. The authenticator uses a three step process, also called a Three-way handshake, to determine if the sent data is legitimate and if it should grant access or not. Step 1. Challenge The authenticating server makes a simple text message or data packet and sends it back to the calling client. Step 2. Response The calling client sends a password or other code that the authenticator knows, and encrypts the message sent during the challenge phase, and sends it back to the server authenticator. Step 3. Success or Failure The server authenticator encrypts the challenge text and sees if its results match what the calling client sent back. If it does, the calling client has the correct password (in this case, the encryption key) and the authenticator sends a success message and grants access so that an NCP Link can be established Business Phone Security Compare Business Products 2013 5

and a VoIP phone call is hosted by the server. If the encrypted messages don t match, a failure message is sent, access is not granted, and the link is not formed so that a VoIP call can be made. Anti-Virus Software Since VoIP softphones are a part of office computers, it is necessary to protect them from harmful viruses and other programs that third parties may send to your employee s email inbox in an attempt to get them to download the attachment, which installs their malicious software and allows them to gain control of your VoIP network. Viruses can attack networks and interrupt, and even stop VoIP services. Most often this is done by attacking security protocols that you put into place. Installation and maintenance of anti-virus and anti-malware software programs, such as firewalls, protect VoIP hardware from coming under attack by third parties. Deep Packet Inspection Deep Packet Inspection (DPI) is a packet filtering method that locates, identifies and classifies data packets. It can then reroute or even block incoming packets that have an unidentified code or forbidden data payloads to deter unauthorized use of an LAN or VoIP network. DPI protocols check all incoming media and signaling streams, and all outgoing media streams for altered or inserted data A DPI system often works best when used in conjunction with firewalls to deter intruders. The challenge message of the CHAP changes frequently, and your VoIP server can request authentication at any timne during use,. packets with deep packet inspection programs. When they are found, the data packets are flagged. VoIP service providers have protocols in place that classify flagged data packets in high to low priority ratings and routes them accordingly. High priority flags may be rerouted or completely Business Phone Security Compare Business Products 2013 6

prevented from being received by the client caller. VoIP providers also use DPI to throttle, or cap, data transfer rates, to improve network performance, and to stop peer-to-peer abuse that may occur during VoIP fraud. Unfortunately, DPI isn t a perfect solution to VoIP security threats as it can create weak areas in networks that are easy for hackers to attack and use DoS attacks or malware to forcibly stop communication between the VoIP server and your computer. Session Border Controllers (SBC) Essentially, SBCs act as firewalls for VoIP. Session border controllers are devices used in VoIP networks to control media streams and protocol signals that start, conduct, and stop VoIP voice calls. SBCs also adhere to quality of service protocols (QoS) to ensure that all VoIP calls are safe, and that they have the best voice quality possible. Stringent Authorization Policies Other ways to keep your VoIP lines secure are to perform audits, and create call restrictions. Audit admin accounts and employee user sessions to keep track of their activities on your VoIP lines. Doing so will allow you to ensure that none of them have been tapped or accessed by unauthorized entities and used for unscrupulous purposes. Restrict VoIP Calls to Prevent Abuse Secure the configuration of your business VoIP apps by creating white lists of country codes that employees can call with your VoIP lines. This type of call restriction list prevents toll fraud and other types of unauthorized use from occurring. Be sure to have your network administrator configure VoIP settings so that only the country codes on your list are used, and enable call restrictions within your Business Phone Security Compare Business Products 2013 7

VoIP network in order to keep your VoIP service as secure as possible By utilizing the VoIP security tools and control protocols that are available today, you will ensure that your business s Internet-based telecommunications will be kept up and running, and that sensitive, proprietary information will remain in the right hands for years to come. Expert Bio Alexis Rohlin has written for Chron.com, the San Francisco Chronicle s SFGate Home, ehow.com, and WISEGeek.com. Rohlin holds a Bachelor of Fine Arts degree in English from Madonna University, with a background in telephony and computer sciences. Business Phone Security Compare Business Products 2013 8

References Unuth, Nadeem. Security Threats In VoIP. About.com. Retrieved December 19, 2013 http://voip.about.com/od/security/a/secuthreats.htm Man in the middle attack (fire brigade attack). Tech Target. Retrieved December 19, 2013 http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack Jungck, Peder. VoIP Fraud: Scenarios and Solutions TMC NET. Retrieved December 19, 2013 http://www.tmcnet.com/voip/0306/featurearticle-voip-fraud.htm VOIP Security. VoIP Info.org. Retrieved December 19, 2103. http://www.voip-info.org/wiki/view/voip+security Piscitello, David. How to Protect Your VoIP Network. Network World. Retrieved December 21, 2013. http://www.networkworld.com/research/2006/051506-voip-guide-security.html?page=3 Rouse, Margaret. CHAP (Challenge-Handshake Authentication Protocol) Tech Target. Retrieved December 22, 2013 http://searchcio-midmarket.techtarget.com/definition/chap Janssen, Cory. Deep Packet Inspection (DPI). Techopedia. Retrieved December 22, 2013. http://www.techopedia.com/definition/24973/deep-packet-inspection-dpi Business Phone Security Compare Business Products 2013 9