The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2006 vol.4)
pp: 80-83
Iv? Arce , Core Security Technologies
ABSTRACT
Today, more than 130 years after the telephone's invention, we face the difficult task of reconciling the prodigal children of the two great men quoted above within the confines of our computer networks. The assignment is far from easy, considering that men from telephony and computing worlds have substantially different philosophies, idiosyncrasies, technologies, business models, entry barriers, and operational characteristics. In this installment of Attack Trends, I delve into the new security and privacy challenges the ongoing widespread adoption of IP telephony and voice over IP (VoIP) pose.
INDEX TERMS
IP telephony, telephony, voice over IP, VoIP, telephone, computer networks
CITATION
Iv? Arce, "Voices, I Hear Voices", IEEE Security & Privacy, vol.4, no. 4, pp. 80-83, July/August 2006, doi:10.1109/MSP.2006.107
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool