60 likes | 142 Views
FLATFISK ASA’s VoIP project . Andreas, Xue, Svein, Kristian. Sketch of VoIP infrastructure. Main reasons for design. Remove single point of failure Minimizes routing of PBX linked calls Use f ortresses in locations that processes the bulk of critical information
E N D
FLATFISK ASA’s VoIP project Andreas, Xue, Svein, Kristian
Main reasons for design • Remove single point of failure • Minimizes routing of PBX linked calls • Use fortresses in locations that processes the bulk of critical information • Use a PBX box in each country for economical and safety/emergency reasons
1 Line Arguments • Fortress in Drammen: • Headquarter, process all information • Fortress in Bruxelles: • Lobby and legal, process a lot of sensitive information • Fortress in London: • Finance assets, process all the finance information • Factory in Lofoten, Palemo: • Only process information about the workers and production, and not strategic information. • Nomadic workers: • Process and sends sensitive information to the fortresses. • Connection: • All connections between each fortress, house and nomadic worker are encrypted using example VPN. • Multiple PBX-switches: • To remove single point of failure, and for economical and emergency reasons (direct connection to emergency services in each country).
Top 5 major risks • DOS(Denial of Service) • Intentional DOS attacks • Overloading the network, consuming all the bandwidth. The VoIP will stop functioning. • Unintentional DOS • Power outage; no way to make any calls • Malware(Software vulnerabilities) • Everyone is connected to everyone on the internet, and every system has a direct link to every hacker and terrorist in the whole world. • Eavesdropping • 3rd party can obtain passwords, names, and other sensitive information, and other service theft. • Man In the middle attacks • Call tampering • Unfaithful Employees • Selling, modifying or destroying assets • Non technical Employees • Unknowingly exposing the system to threats
References • VOIP security review: insurance • By Hary E. Emerson, III • The Top 5 VoIP Security Threats of 2008 • Jim Higdon | January 24, 2008