Seguridad lógica de redes de voz sobre IP.

Today many companies have ventured into a new method for carrying calls over an IP network of data, either the Internet or the internal network of an organization, this progress has been attractive not only because of costs but also for the provision of services. Converting a homogeneous network tha...

Description complète

Enregistré dans:
Détails bibliographiques
Auteur principal: Quizhpe Montoya, Enith Tatiana (author)
Format: bachelorThesis
Langue:spa
Publié: 2016
Sujets:
Accès en ligne:http://dspace.unl.edu.ec/jspui/handle/123456789/11280
Tags: Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
Description
Résumé:Today many companies have ventured into a new method for carrying calls over an IP network of data, either the Internet or the internal network of an organization, this progress has been attractive not only because of costs but also for the provision of services. Converting a homogeneous network that can carry not only data but also voice, VoIP technology also has great advantages and its implementation can be done easily and quickly. VOIP also features superior telephone exchanges, making the Band-width, and maintenance easier than the classical exchanges. However the birth of new technologies brings with them new vulnerabilities that are often overlooked by most users. This degree work is based on a study carried out at the Universidad National de Loja in the non-renewable industries department to understand the vulnerabilities present in the network of deployed VoIP exchanges in the energy and communications. The objectives have been selected, the tools have been used for catches, which have been the basis of the study of the network of voice over IP, which has been developed in three phases: (1) analysis and choice of tools, (2) implementation and evaluation of logical security mechanism and (3) logical design for voice over IP networks. The analysis of other case studies and direct observation, surveys and interviews, together with the results obtained allowed me to understand the vulnerabilities in the current network. Detecting weak points in the system helped me to thus propose a model that can improve the quality, safety and security of the service in the future.