Is VoIP Secure?  You Make the Call
by Steven Taylor, Distributed Networking Associates, Inc
Posted 4/22/03




Voice over IP (VoIP) is no longer tomorrow’s technology. High-speed networks that support quality-of-service (QoS) technology have come a long way in mitigating performance and availability issues. 


But what about security? If your network is robust enough, securing VoIP is manageable. But if you’re contemplating Internet telephony, you’re entering dangerous territory.


Internally, voice running over your data lines is essentially no more or less secure than any other application in your IP infrastructure. And, in some respects, it’s at least as secure as traditional telephony. VoIP is here, now, and growing. When we examine VoIP in the context of well-known issues of IP data and traditional telephone security, implementation remains a security challenge—but not necessarily a nightmare. 


About the Author:


Steven Taylor is president of Distributed Networking Associates and publisher of, a Web site dedicated exclusively to technology tutorials in the broadband packet areas of frame relay, ATM and IP. Taylor also is a columnist for Network World and coauthor of Network World's "Wide Area Networking" and "Convergence" newsletters. Taylor can be reached at



Download paper
Note: This article originally appeared in the April 2003 issue of Information Security magazine ( Copyright (c) 2003. All rights reserved.

Approx. 149 kB


Click here for help with .pdf downloads. 


Related Paper:

VoIP Implementation: Who’s Doing It, and Why


Return to Voice over Packet menu


Return to Security menu


Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at