{"title":"中小型组织中的VoIP安全治理","authors":"James M. Anderson","doi":"10.1145/2670739.2670746","DOIUrl":null,"url":null,"abstract":"Information security has become an important part of business in recent years. The purpose of this document is to examine information security governance as it relates to the growing field of Voice over Internet Protocol. The paper will begin with an examination of the central components of information security governance---corporate governance and information technology governance. Once this foundation is created, the paper will explore VoIP specific issues as they relate to information security governance, such as common attacks, vulnerabilities, and protocols. Because policy is, arguably, the most important aspect of information security governance, the final part of the paper will explore this topic as well as common issues.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"VoIP security governance in small/medium organizations\",\"authors\":\"James M. Anderson\",\"doi\":\"10.1145/2670739.2670746\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security has become an important part of business in recent years. The purpose of this document is to examine information security governance as it relates to the growing field of Voice over Internet Protocol. The paper will begin with an examination of the central components of information security governance---corporate governance and information technology governance. Once this foundation is created, the paper will explore VoIP specific issues as they relate to information security governance, such as common attacks, vulnerabilities, and protocols. Because policy is, arguably, the most important aspect of information security governance, the final part of the paper will explore this topic as well as common issues.\",\"PeriodicalId\":331424,\"journal\":{\"name\":\"Proceedings of the 2014 Information Security Curriculum Development Conference\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2014 Information Security Curriculum Development Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2670739.2670746\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2670739.2670746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
VoIP security governance in small/medium organizations
Information security has become an important part of business in recent years. The purpose of this document is to examine information security governance as it relates to the growing field of Voice over Internet Protocol. The paper will begin with an examination of the central components of information security governance---corporate governance and information technology governance. Once this foundation is created, the paper will explore VoIP specific issues as they relate to information security governance, such as common attacks, vulnerabilities, and protocols. Because policy is, arguably, the most important aspect of information security governance, the final part of the paper will explore this topic as well as common issues.