{"title":"VoIP security governance in small/medium organizations","authors":"James M. Anderson","doi":"10.1145/2670739.2670746","DOIUrl":null,"url":null,"abstract":"Information security has become an important part of business in recent years. The purpose of this document is to examine information security governance as it relates to the growing field of Voice over Internet Protocol. The paper will begin with an examination of the central components of information security governance---corporate governance and information technology governance. Once this foundation is created, the paper will explore VoIP specific issues as they relate to information security governance, such as common attacks, vulnerabilities, and protocols. Because policy is, arguably, the most important aspect of information security governance, the final part of the paper will explore this topic as well as common issues.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2670739.2670746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Information security has become an important part of business in recent years. The purpose of this document is to examine information security governance as it relates to the growing field of Voice over Internet Protocol. The paper will begin with an examination of the central components of information security governance---corporate governance and information technology governance. Once this foundation is created, the paper will explore VoIP specific issues as they relate to information security governance, such as common attacks, vulnerabilities, and protocols. Because policy is, arguably, the most important aspect of information security governance, the final part of the paper will explore this topic as well as common issues.