1 / 18

Addressing Security Issues

Addressing Security Issues . IT Expo East 2011. Addressing Security Issues Unified Communications. SIP Communications in a UC Environment. Addressing SIP Security Security. Why is Security Important? End of Geography

naiara
Download Presentation

Addressing Security Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Addressing Security Issues IT Expo East 2011

  2. Addressing Security Issues Unified Communications SIP Communications in a UC Environment

  3. Addressing SIP Security Security Why is Security Important? • End of Geography • IP Protocol is an OPEN network system, no longer need to be physically present • Any IP Address can connect with any other IP Address, WAN to WAN, WAN to LAN, LAN to WAN, and LAN to LAN. • Prevent Fraudulent Activities • Prevent Disruption of Service

  4. SIP Trunk-UC Workshop The Role of an E-SBC - Security Common SIP Attacks • Intrusion of Services (or Stealth of Service) • Devices attempting Register with a IP-PBX in an attempt to look like an IP-PBX extension and gain IP-PBX services • SPIT (SPAM over Internet Telephony) • Toll Fraud • A form of an Intrusion of Service, where malicious attempts to send INVITEs to an IP-PBX to gain access to PSTN Gateways and SIP Trunking to call the PSTN • Denial of Service • INVITE (or any SIP Request) Flood in an attempt to slow services or disrupt services • Or any UDP or TCP traffic directed at a SIP Service on SIP Ports • Indirect Security Breaches

  5. Typical Network Deployments Internet Managed Service Provider Hosted or Cloud Services

  6. Addressing Security Issues Secured Unified Communications over the Internet

  7. Addressing Security Issues Typical Network Deployments Internet Telephony Service Providers • Delivery of SIP Trunking Services over the Public Internet • Security Advantages • One Control Point • Any Trunking Service from Anywhere • Terminate Local, Out of State, and International numbers • Most Flexible delivery of SIP in UC • Optimize Bandwidth for Voice & Data traffic – QoS • Security Disadvantages • Highest level of typical Internet security concerns, DoS, Vishing, Fuzzying, Thieft of Service (Toll Fraud) and others • Access Control Lists are not enough, more detailed inspection is required

  8. Addressing Security Issues Typical Network Deployments - ITSP Addressing Internet SIP Security • There is an obvious need to have a Security, as Internet is the Most insecure network • Prevent Fraudulent Activities • Identify Theft, Toll Fraud, Spoofing, Misuse • SPAM, SPIT • Vishing • Eavesdropping • Data Mining • Reconnaissance • Prevent Disruption of Service • Denial of Service • Fuzzing

  9. Addressing Security Issues Secured Unified Communications over a Managed Service Provider

  10. Addressing Security Issues Typical Network Deployments Managed Telephony Service Providers • Delivery of SIP Trunking Services over the Private Carrier Service • The Enterprise Customer still needs to protect their assets and intellectual property. • Security Advantages • No Internet SIP security concerns from the Carrier– WhooHoo!  • Security Disadvantages • No Optimization of Voice and Data Bandwidth • Customer Enterprise still connecting to an Untrusted Network • There is still an Internet Connection somewhere at the Enterprise… • What if the Managed Service Provider is providing both Internet and SIP?

  11. Addressing Security Issues Typical Network Deployments - Managed Addressing Managed Service Provider SIP Security • There little to no risk of Internet type Security Risks • From the Enterprise Customers perspective, • The Carrier Network is still “Untrusted” – Anything that is not their own and not under their security to protect their assets and intellectual property • Only allow SIP Communications from the Carrier • Prevent Fraudulent Activities • Identify Theft, Toll Fraud, Spoofing, Misuse – In Both Directions • Data Mining

  12. Addressing Security Issues Secured Unified Communications over a Hosted Service Provider

  13. Addressing Security Issues Typical Network Deployments Hosted Telephony Service Providers • Delivery of SIP Trunking and other Services over a Hosted Service Provider (Services “In the Cloud”) • Can be delivered over the Internet or Managed private carrier service • In ether deployment Enterprise Customer has to protect their assets and intellectual property • Advantages & Disadvantages • When over the Internet – Same as before • When over Managed – Same as before

  14. Addressing Security Issues Typical Network Deployments - Managed Addressing Hosted Service Provider SIP Security • Depends on method of deployment, following issues mentioned before. • From the Enterprise Customers perspective: • The Carrier Network is still “Untrusted” – Anything that is not their own and not under their security to protect their assets and intellectual property • Only allow SIP Communications to the Carrier • Prevent All Fraudulent Activities • Identify Theft, Toll Fraud, Spoofing, Misuse – In both directions • Data Mining

  15. SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? • Encryption • Transport Layer Security (TLS) – Encryption of SIP Signaling

  16. SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? • Encryption • Secure RTP (SRTP) – Encryption of Media

  17. SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? • Prevent Fraudulent Activities • Access Control • Traffic Policies • Topology Hiding • Encryption • Prevent Disruption of Service • Intrusion Detection Service / Intrusion Prevention Service • Blacklisting

  18. THE END

More Related