Search This Blog

Monday, August 01, 2005

Reader: Where VoIP encryption is needed


NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
08/01/05
Today's focus: Reader: Where VoIP encryption is needed

Dear security.world@gmail.com,

In this issue:

* Reader argues for VoIP encryption in certain situations
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Reviewing Trends and Insights for
SMB Executives

Life is different for IT professionals at small and mid-sized
businesses, which don't have the luxury of hiring legions of
network experts. Read how network executives are keeping a firm
footing on an ever-shifting product landscape. Learn about
trends and insights surrounding VoIP and VPNs; plus get
commentaries from leading experts on storage strategies for
smaller businesses.
http://www.fattail.com/redir/redirect.asp?CID=109141
_______________________________________________________________
WIRELESS LANS BUYER'S GUIDE: THE GOODS ON 185 PRODUCTS

We've compiled the largest buyer's guide ever on wireless LAN
equipment. Whether you're looking for an access point, PC Card
or trying to decide between 802.11a, b or g, take a look at the
information that vendors have provided us. We've got the goods
on 185 products. Click here for more:
http://www.fattail.com/redir/redirect.asp?CID=109021
_______________________________________________________________

Today's focus: Reader: Where VoIP encryption is needed

By Steve Taylor and Larry Hettick

In continuing our discussion on encryption of VoIP, one reader
responded with an analysis of areas where he felt it was
important to encrypt VoIP traffic.

The reader pointed out that while he agreed in principle with
our premise that encryption was generally not necessary, he
pointed out some areas where he felt encryption was most
appropriate.

In particular, he noted:

"1. Any IP contact center VoIP traffic (public or private
sector), where confidential information may be disclosed during
the conversation (calling a bank, calling the Motor Vehicle
Office, County Treasurer, etc.); especially as 'inline'
click-to-talk proliferates (and I certainly accept encryption
with any form of secure VPN, whether Web-based/SSL, or IPSec).
This would be predominantly non-intranet-based customer-to-agent
traffic.

"2. Rich media or collaboration server sessions, where
triple-play services are used. For example - Cisco MeetingPlace
sessions, where IP-based Web, video and voice traffic are in the
session. Collaboration servers and services (such as WebEx or
Microsoft Live Meeting) are becoming extremely popular, more so
with the cost of travel skyrocketing. These are hosted services
typically, and ride the public Internet, in many instances.

"3. VoIP traffic in the first responder and public safety space
- whether wired or wireless. Whether pure VoIP, or LMR traffic
over IP, this should definitely be encrypted (common example -
cop car with IP phone, talking over a 802.11 hot spot, back to
substation, or metropolitan base station).

"4. College campuses, where VoIP - wired or wireless - VLANS,
and/or hot-spots carry sensitive information (student personal
data, exam scores, medical information, etc.).

"5. Healthcare where there is a HIPAA or confidentiality mandate
to secure VoIP traffic/data."

We think the fifth point is particularly relevant. Not only is
it important to be concerned about protecting information where
necessary, but it's also important to comply with regulations.
(And we'll wait for our readers to comment on whether mandated
encryption in certain situations is or is not appropriate.)

The top 5: Today's most-read stories

1. Furor over Cisco IOS router exploit erupts at Black Hat
<http://www.networkworld.com/nlconvergence4094>

2. Cisco, ISS, Michael Lynn and Black Hat sign legal accord
<http://www.networkworld.com/nlconvergence4095>

3. Researcher at center of Cisco router-exploit controversy
speaks out <http://www.networkworld.com/nlconvergence4096>

4. 2005 Salary Survey
<http://www.networkworld.com/nlconvergence3861>

5. Cisco nixes conference session on hacking IOS router code
<http://www.networkworld.com/nlconvergence4097>
_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials <http://www.webtorials.com/>, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
<mailto:taylor@webtorials.com>

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
<mailto:lhettick@currentanalysis.com>
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Reviewing Trends and Insights for
SMB Executives

Life is different for IT professionals at small and mid-sized
businesses, which don't have the luxury of hiring legions of
network experts. Read how network executives are keeping a firm
footing on an ever-shifting product landscape. Learn about
trends and insights surrounding VoIP and VPNs; plus get
commentaries from leading experts on storage strategies for
smaller businesses.
http://www.fattail.com/redir/redirect.asp?CID=109140
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
Trends affecting WAN in powerful ways - Webcast Explains

A panel of experts will help you understand the principles of
the Adaptive WAN and how it can help you proactively address the
challenges emerging in your evolving enterprise IT architecture.
http://www.fattail.com/redir/redirect.asp?CID=109092
_______________________________________________________________
FEATURED READER RESOURCE
SIX TIPS FOR GETTING WHAT YOU DESERVE

Before you go in for your next annual review or promotion
interview, you would be wise to consider these tips for ensuring
you've got the right stuff to move ahead. Network executives
offer advice to help you gun for that next promotion and fatten
up your paycheck. Click here:
<http://www.networkworld.com/you/2005/072505-salary-side2.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: