Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Androidâ„¢ device!
Install
Faster access than browser!
 

VoIP vulnerabilities

Index VoIP vulnerabilities

VoIP is vulnerable to similar types of attacks that Web connection and emails are prone to. [1]

9 relations: Caller ID, Caller ID spoofing, Comparison of VoIP software, INVITE of Death, List of VoIP companies, Mobile communications over IP, Voice over IP, Voice over WLAN, VoIP phone.

Caller ID

Caller ID (caller identification, CID), also called calling line identification (CLID), Calling Line Identification (CLI), calling number delivery (CND), calling number identification (CNID), calling line identification presentation (CLIP), or call display, is a telephone service, available in analog and digital telephone systems, including VoIP, that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up.

New!!: VoIP vulnerabilities and Caller ID · See more »

Caller ID spoofing

Caller ID spoofing is the practice of causing the telephone network to indicate to the receiver of a call that the originator of the call is a station other than the true originating station.

New!!: VoIP vulnerabilities and Caller ID spoofing · See more »

Comparison of VoIP software

This is a comparison of voice over IP (VoIP) software used to conduct telephone-like voice conversations across Internet Protocol (IP) based networks.

New!!: VoIP vulnerabilities and Comparison of VoIP software · See more »

INVITE of Death

An INVITE of Death is a type of attack on a VoIP-system that involves sending a malformed or otherwise malicious SIP INVITE request to a telephony server, resulting in a crash of that server.

New!!: VoIP vulnerabilities and INVITE of Death · See more »

List of VoIP companies

This is a list of companies providing voice over Internet Protocol (VoIP) services.

New!!: VoIP vulnerabilities and List of VoIP companies · See more »

Mobile communications over IP

MoIP, or mobile communications over internet protocol, is the mobilization of peer-to-peer communications including chat and talk using internet protocol via standard mobile communications applications including 3G, GPRS, Wifi as well as Wimax.

New!!: VoIP vulnerabilities and Mobile communications over IP · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: VoIP vulnerabilities and Voice over IP · See more »

Voice over WLAN

Voice over wireless LAN (VoWLAN, also VoWi-Fi) is the use of a wireless broadband network according to the IEEE 802.11 standards for the purpose of vocal conversation.

New!!: VoIP vulnerabilities and Voice over WLAN · See more »

VoIP phone

A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet, instead of the traditional public switched telephone network (PSTN).

New!!: VoIP vulnerabilities and VoIP phone · See more »

Redirects here:

VoIP Vulnerabilities.

References

[1] https://en.wikipedia.org/wiki/VoIP_vulnerabilities

OutgoingIncoming
Hey! We are on Facebook now! »