Is your Session Border Controller providing a false sense of security?
Autor: | Paul German |
---|---|
Rok vydání: | 2017 |
Předmět: |
Information Systems and Management
biology Computer Networks and Communications Computer science Session border controller ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Denial-of-service attack SIP trunking Computer security computer.software_genre Toll biology.protein Safety Risk Reliability and Quality computer Vulnerability (computing) |
Zdroj: | Network Security. 2017:14-16 |
ISSN: | 1353-4858 |
DOI: | 10.1016/s1353-4858(17)30007-7 |
Popis: | Organisations have latched on to the need to secure SIP trunking solutions by implementing a Session Border Controller (SBC). The problem is that the vast majority of SBCs are considered not just one-off investments but also one-off deployments. Yet from denial of service attacks to toll fraud, SIP trunking is not only inherently vulnerable, that vulnerability continues to change and escalate. Few companies would fail to update anti-virus software, so why assume the SBC can protect against changing threats without similar routine updates? The fact is that in their current guise, most SBCs actually leave organisations with a false sense of security. |
Databáze: | OpenAIRE |
Externí odkaz: |