[Best Possible Availability and Security for IMS-Based Voip Networks: Delegated Firewall Administration]
by
Abstract
The main purpose of this paper is to make an analysis on the best possible availability and security for IMS-Based Voip Networks: Delegated Firewall Administration. The IMS-Based Voip network is a very essential tool and network for the technology. Therefore, the security concerns are growing day by day for this network. Therefore, there is a great need to provide the desired security for the IMS-Based Voip networks. Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide several opportunities. Lower cost and more flexibility are the main advantages of the VoIP which derived the attention of the enterprises to it. Unfortunately in the other extreme, some security issues may come across with the extensive use of VoIP (Ahmed, 2009, p. 58). The purpose of this review paper is to encourage the VoIP industry to consider the importance of the security matters of their application and to find the gaps by discussing the pros and cons of each application and performing the fair comparison.
Acknowledgements
In order to conduct this research proposal, I would like to thank my parents who provided me immense appreciation to conduct this research proposal. I would also like to thank my teachers who provided me full guidance whenever I needed it, and provided me complete help to develop this research proposal. I would also like to thank my fellow students who gave me support to conduct this research proposal.
Table of contents
Chapter 1: Introduction5
Background of the study5
Problem Statement6
Theoretical Framework7
Purpose of the study8
Research Questions8
Rationale of the study8
Significance of the study8
Limitation of the study9
Chapter 2: Literature Review9
VoIP Security Issues11
Summary of Literature14
Chapter 3: Materials and Methods15
Conceptual Framework16
Discussion17
Research Design18
Sampling18
Data Collection Tools19
Data Analysis19
Reliability & Validity19
Ethical issues21
References22
Best Possible Availability and Security for IMS-Based Voip Networks: Delegated Firewall Administration
Chapter 1: Introduction
Background of the study
Voice over IP or VoIP is a technique for transferring voice over networks that are based on IP protocol, basically internet. It has been bubbling under for a long time, but seems now to be gaining ground. Its cost-effectiveness, flexibility and the possibility to use the existing network for voice communication are something that enterprises and organization see worth venturing. In particular Banking, Financial Services and Insurance (also known as BFSI) have adapted VoIP in both their internal communication as well as customer service (Braun2003, p. 14).
However, while they plunge in head first, they often ignore the VoIP quality and security issues. New technologies contain bugs and problems that can, even under normal use, cause deterioration in sound quality that the users are not used to in the traditional telephone networks. Ensuring VoIP security and integrity against outside attacker is another challenge. While the traditional phone network is by no means flawless, it is in essence a closed network: an outside attacker has a hard time trying to get in. Putting the phone conversation in the internet opens them up for all the security threats of the IP based ...