×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • VoIP techniques

    As with any other technological advancement in use in today’s age, security threats are proving to be the major challenges and risks. Knowledge about these security vulnerabilities presents an avenue of protecting organizational assets against virtual attacks. VoIP phone systems are becoming increasingly popular in today’s society for business and personal purposes. VoIP services are increasingly productive and cheap, thereby, providing adopters a competitive edge. The paper explores a brief overview of VoIP techniques including network components, structure, standards and protocols, data processing techniques and quality of service.

    Keywords: VoIP, VoIP components, VoIP structure, Cybercrime, Computer security