1 / 10

Is there any Security with Voice Mail?

Is there any Security with Voice Mail?. By Melanie Feder ECE478 Dr. Koc May 31, 2002. Voice Mail Intruders? Just ask. Carly Fiorina of Hewlett Packard what she said led to a law suit and trial Reliable Consulting Firm lost customers due to messages intercepted Successful hacker

Download Presentation

Is there any Security with Voice Mail?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Is there any Security with Voice Mail? By Melanie Feder ECE478 Dr. Koc May 31, 2002

  2. Voice Mail Intruders? Just ask... • Carly Fiorina of Hewlett Packard • what she said led to a law suit and trial • Reliable Consulting Firm • lost customers due to messages intercepted • Successful hacker • created infinite loops through voice mail systems

  3. Security and Privacy • Privacy doesn’t exist- messages are archived even when deleted • Most systems are not secure (Not confidential) • Be Careful!

  4. Password Vulnerabilities • Major Problem: Easy to Break Passwords • usually 4-6 numbers in length out of 10 possible • passwords chosen usually easy to remember • factory passwords not changed

  5. PBX Vulnerabilities Examples • Can tap into maintenance ports • Remote access by nature • Usually helped maintained by contractors • Software upgrades can lead to vulnerabilities

  6. Laws Surrounding Security • Uncharted territory • Conflicting Laws • 1968 Wiretap Act • 1986 Electronic communications Privacy Act • 33 states have their own laws, but can’t keep up with technology

  7. Measures to Curb Break-Ins • Lock up the PBX Center at all Times • Educate employees about passwords • Disconnect unused outlets, LAN connections, etc. • Monitoring (spying?) • Encryption...

  8. Cryptography for Voice Mail? • Not widely used yet… • Public/ private key encryption • PKI and CA for public keys • PGP • S/MIME • Digital voice encryptor/decryptor

  9. Disadvantages • Delays in throughput • Voice clarity if use encryption results in reduced bandwidth • Expense

  10. Conclusion • Voice mail systems are very vulnerable • Many cases exist to date of voice mail intrusions • Laws are waffling about legality and privacy vs. security • Security technology has not kept pace with hackers

More Related