Security: VoIP's heart knot

Source: Internet
Author: User
Keywords Security VOIP
Tags full network internet internet + it is network network security process read
Intuition tells us that it is not possible to achieve VoIP's full network security. But the undeniable fact is that every time we talk about VoIP-related topics, security is a knot in the heart. For some reason, it is thought that VoIP, whether transmitted over the Internet or otherwise, carries some inherent insecurity. Therefore, it is believed that only end-to-end encryption can be used to resolve this problem during the call process. Recently read an article on VoIP emerging encryption needs to give criticism, the authors even think that using VoIP is like using Microsoft Windows or some anti-virus software, need to constantly upgrade, update, users will have the feeling of technical hold-up. In fact, no one does not agree that there should be a very secure foundation in the implementation of VoIP, this gives the "spread" of arguments that emphasize the encryption of conversations during a call, but over time people get tired of, "gosh, how much encryption does this thing have to do?" In fact, when we consult with telecom operators, they will tell us that the encryption of voice traffic is usually not considered, because few users ask such a question. But why must VoIP be encrypted? Is there too much encryption in VoIP traffic? Why is this happening? Experts point out that in order to encrypt IP data streams, technologies such as IPSec and SSL can be easily implemented, so any ip-based data stream, such as VoIP, can use these technologies to achieve minimal encryption. In addition, many free or almost free VoIP applications can provide default encryption options. Experts suggest that it would be nice to use encryption for VoIP as long as it is important. Never assume that encryption is an absolute necessity in a successful VoIP implementation. To put it simply, VoIP encryption and the excessive worry about its safety factor, in the opinion of experts is actually a kind of "abnormal" psychology. It is like we save money to the bank, and then the passbook locked in the safe, and then lock the door, and then add anti-theft door, then the dog tied to the security door outside, and then ... In fact, all we have to do is spend the money. (Responsible editor: ZHAOHB) to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) title Party (0 Votes) passed (0 Votes) Original: Security: VoIP Heart knot return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.