Mitigation of Security Concerns of VoIP in the Corporate Environment

Author(s):  
Fernando Almeida ◽  
José Cruz

The convergence of the voice and data worlds is introducing exciting opportunities to companies. As a consequence, Voice over IP (VoIP) technology is attracting increasing attention and interest in the industry. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. However, voice services also introduce a new level of vulnerability to the network. This chapter categorizes and analyzes the most common security threats of a VoIP solution in a corporate environment. Besides that, the authors discuss the most relevant security policies that could have been adopted to mitigate the security vulnerabilities introduced by VoIP. These new policies and practices can have a positive impact on the security of the whole network, not just voice communications.

2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


2021 ◽  
Vol 13 (12) ◽  
pp. 6627
Author(s):  
Shichao Sun ◽  
Yuanqian Liu ◽  
Yukun Yao ◽  
Zhengyu Duan ◽  
Xiaokun Wang

Sustaining the development of car-sharing is considered an efficient way to counter environmental issues worldwide. Against this background, college students are recognized as a promising customer group of car-sharing service providers in China. However, the determinants that promote students’ willingness to use car-sharing services are rarely studied, and the uniqueness of college students in China in the context of car-sharing is justified. Therefore, this paper examines the key factors that affect Chinese college students’ adoption of car-sharing. An empirical study using samples from Dalian Maritime University was conducted, and survey data were collected via the Internet. Specifically, respondents’ socio-demographics were obtained, and their latent attitudes on car-sharing services were measured in terms of willingness to use car-sharing services, perceived usefulness, perceived ease of use and safety concerns. In addition, nine hypothetical travel scenarios were defined, and regarding each travel scenario, the respondents were asked to state whether they were willing or not to use car-sharing services. On this basis, a hybrid logit model was established to investigate the key factors that influenced the willingness to use car-sharing services. Aside from the common findings in line with previous studies, the results indicate that with the increase in the number of travel fellows, willingness to use car-sharing services went up. Furthermore, college students’ willingness to use car-sharing services was significantly affected by money costs rather than time costs. Additionally, college students in China are more likely to use car-sharing services during workday off-peak hours and weekends. Separately, among the respondents’ latent attitudes, only the perceived usefulness of car-sharing services was found to have a significant and positive impact on students’ willingness to use them. Relevant policy implications with regards to theoretical findings are also offered in this paper to car-sharing service providers in China.


Author(s):  
Bisma Gulzar ◽  
Ankur Gupta

As IoT applications are pervasively deployed across multiple domains, the potential impact of their security vulnerabilities are also accentuated. Sensor nodes represent a critical security vulnerability in the IoT ecosystem as they are exposed to the environment and accessible to hackers. When compromised or manipulated, sensor nodes can transmit incorrect data which can have a damaging impact on the overall operation and effectiveness of the system. Researchers have addressed the security vulnerabilities in sensor nodes with several mechanisms being proposed to address them. This paper presents DAM (Detect, Avoid, Mitigate), a theoretical framework to evaluate the security threats and solutions for sensor security in IoT applications and deployments. The framework leads to the classification of sensor security threats and categorization of available solutions which can be used to either detect vulnerabilities and attacks, recover from them or completely avoid them. The proposed framework will be useful for evaluating sensor security in real-world IoT deployments in terms of potential threats and designing possible solution


2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2021 ◽  
Vol 58 ◽  
pp. 146-160
Author(s):  
Frank D. Steinheimer

Grottenolme Proteus anguinus (Laurenti, 1768) zeigen eine sehr geringe Fortpflanzungsrate, werden sehr alt und haben eine im Vergleich zum Menschen verzögerte Generationenfolge. Damit sind Olme Lebewesen für spannende evolutionsbiologische Fragestellungen, die sich um Populationswachstum drehen. Die vorliegende Arbeit zeigt auf, dass eine stabile Umwelt, wenig Krankheiten, das Fehlen von Fressfeinden und ausreichende Nahrungsressourcen evolutiv einen starken Einfluss auf das fehlende Populationswachstum beim Olm haben. Ein Vergleich mit dem Menschen eröffnet, neben der Bildung und dem Aufbrechen von Bräuchen, auch Wege naturgegebener Mechanismen, wie das Wachstum der Weltbevölkerung sich stabilisieren ließe. Der verzögerte Eintritt in die Reproduktion zeigt beim Grottenolm zudem einen positiven Effekt auf die Langlebigkeit. Human fish and human beings – European Cave Salamander Proteus anguinus (Laurenti, 1768) explains longevity and population growth Abstract: European Cave Salamanders, more specifically olms, show a low reproduction rate, reach methuselah ages and exhibit extended generation frequencies in comparison to humans. Olms are therefore considered an interesting study object for evolutionary questions about population growth. The paper discusses stable environment, good health, top predator position and continuous basic food supply as the key factors for stagnation of population growth in olms as well, if combined with education, as in humans. A late start of reproduction triggers in turn a positive impact on longevity.


Author(s):  
Wasan Awad ◽  
Hanin Mohammed Abdullah

Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact that organizations are not capable of following the cyber security evolution and secure their storage systems from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the cyber security of their storage systems by applying certain techniques.


2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


Sign in / Sign up

Export Citation Format

Share Document