READ TEXT AND ANSWER QUESTION:
TEXT
Vol. 8, July 1, 2005
Technology
What Organizations Should Know About VoIP - And Auditors Too
By Raquel S. Filipek
Editor, ITAudit
Many organizations are taking advantage of voice-over Internet protocol (VoIP) technology. Although there are great advantages to its use, auditors should understand the security risks posed by VoIP connections and help IT departments find ways to mitigate threats. |
Information technologies have revolutionized the way people communicate and work. Most computers are equipped with the latest versions of MSN Instant Messenger, Outlook Express, and other applications that facilitate data transfer and access. Wireless devices, such as cell phones, pagers, and personal handheld computers, are found everywhere and used by top-level executives and teenagers alike. Although it's taken a bit longer, telephones are finally joining the wireless club with VoIP - a technology that converts analog audio signals into digital data that is transmitted over the Internet. Digital data is then converted back into an analog signal, so users can speak with anyone using a regular phone.
The biggest draws to VoIP service are its economical price and flexibility. In the United States, phone and cable service providers are offering VoIP calling plans that are often better than cell phone plans, and government agencies, such as the U.S. Federal Communications Commission (FCC), are considering VoIP service as an alternative to traditional phone systems. However, VoIP is not perfect. The Cyber Security Industry Alliance (CSIA) - a public policy and advocacy group - recently published a report, Cyber Security for IP Telephony, that outlines several VoIP security recommendations the U.S. Congress should consider while revising the Telecommunications Act of 1996. As organizations become increasingly concerned over data theft and network security vulnerabilities, internal auditors need to assess the risks and advantages of switching to VoIP before organizations invest in this new technology.
(http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5631)
According to the text, current computers are mostly: