Voice over the internet Protocol (VoIP) phone system allows you to make calls over broadband internet connection to a receiver who is also receiving calls over the internet though if it is interconnected it can be used to make calls to and receive calls from traditional land-line numbers but usually at a cost.
It is an easy also easy to establish your own phone system for example by just downloading the software required from the intended server and installing it into your computer then signing up with an Internet Telephony Provider and you will be able to make distant calls via internet connection using a computer with a microphone and an earpiece to anyone using this method. As it is similar with other internet applications it is also associated with threats such spam over internet telephony (spit), spoofing and identity not forgetting lack of confidentiality. SPIT involves sending telemarketing which includes sending of commercial messages as it is fast and cheap. Spoofing involves an attacker masquerading as another caller who is known and trusted source a bank for example. A person can also collect sent data and attempt to reconstruct a conversation.
There are two main ways of fraud: First is where there are used to call premium rate numbers and earn revenue share fraud and the second one is where they are used to make expensive calls such international ones without paying themselves, is also referred to as toll fraud. Toll fraud can be sold as prepaid international calling at low rates for example using calling cards. As a result of the rise and development in the use of the internet people can learn very fast how to hack servers even download tools that will help them in hacking.
There are basic steps that one can follow to secure their internet threats and risks including frauds. This include protecting your resources on the internet using a firewall which for example allows access only from trusted IP addresses, this should applies even to your private branch exchange server itself. Passwords or pin numbers provided at the time of purchase by the vendor should never be used since in most cases these are easily guessed entities and can easily be obtained from the web.
Most people use mobile devices to provide VoIP services, in such cases the mobile devices should then be protected with a mobile pin number or password or mobile device application that crash the device in case it is lost or stolen. A factory reset should be also performed on all old equipment devices. On laptops passwords should be removed and running application that holds confidential details should be uninstalled.
The service provider can also take measures to detect fraud for example through monitoring calls through the phone system for example calls made to a new destination increasing significantly should raise alarm and the provider can contact you to confirm whether the calls are made from your authorization or to inform you that something might be wrong
Leave a Comment
You must be logged in to post a comment.