شماره ركورد :
1066458
عنوان مقاله :
تحليل و اولويت بندي چالش هاي امنيتي وُيپ
عنوان به زبان ديگر :
Analysis and Prioritization of VoIP Security Challenges
پديد آورندگان :
بختياري، سعيد دانشگاه علوم انتظامي امين، تهران - گروه فناوري اطلاعات , زارع، اسماعيل دانشگاه علوم انتظامي امين، تهران
تعداد صفحه :
36
از صفحه :
183
تا صفحه :
218
كليدواژه :
وُيپ , امنيت , چالش , راهكار مقابله
چكيده فارسي :
معماري شبكه‌‌ آي‌‌پي از نقطه‌ نظر امنيتي شكننده است و وُيپ نيز كه از استانداردهاي اين شبكه‌ استفاده مي‌‌كند با حملات متعدد مورد آسيب قرار مي‌‌گيرد، حملاتي كه كاهش كيفيت و در مواردي قطع خدمات و اتلاف منابع وُيپ را به دنبال دارد. در اين راستا تأمين امنيت وُيپ امري ضروري است و به‌ طور معمول اعمال راهكارهاي امنيتي در سامانه‌‌ها از جمله وُيپ موجب كندي و كاهش كيفيت عملكرد و افزايش هزينه‌هاي راه‌‌اندازي و نگهداشت مي‌‌شود؛ بنابراين مديران فناوري اطلاعات مي‌‌بايست راهكارهاي امنيتي با درجه‌ي اولويت بالا را ‌‌مدنظر قرار دهند. براي اين كار با مرور ادبيات تحقيق، ماتريس جامع امنيت وُيپ مشتمل بر فهرست جامعي از چالش‌‌هاي امنيتي وُيپ و راهكارهاي مقابله استخراج گرديد كه كمك بسزايي در هوشمندي و مديريت ريسك سازمان‌ها مي‌نمايد. نتايج به‌ دست‌ آمده در اين مقاله نشان داد كه انجام سه راهكار «جداسازي VLAN­هاي ترافيك صوت و داده»، «احراز هويت سيگنالينگ» و «احراز هويت درگاه» بيشترين تأثير مثبت را بر امنيت وُيپ دانشگاه علوم انتظامي خواهد داشت. نتايج حاصل با توصيه‌ها و راهكارهاي مقابله امنيتي ذكرشده توسط تحقيقات قبلي و مؤسسات معتبر امنيتي كاملاً مطابق و هم‌‌راستا است و فقط اولويت‌‌هاي پيشنهادي جابجا شده است. لذا در برنامه‌هاي راهبردي فناوري اطلاعات سازمان و تصميم‌گيري و نظارت مديران فناوري اطلاعات سه راهكار مذكور مي‌بايست در اولويت به‌ كارگيري وُيپ لحاظ گردد.
چكيده لاتين :
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application.
سال انتشار :
1397
عنوان نشريه :
مطالعات مديريت كسب و كار هوشمند
فايل PDF :
7601166
عنوان نشريه :
مطالعات مديريت كسب و كار هوشمند
لينک به اين مدرک :
بازگشت