VoIP and Multimedia Security - Comprehensive Study Guide
1. Differences Between Cloud-Based Phone Systems
Hard Phones: Physical IP phones (e.g., Cisco IP Phones) connected using Ethernet.
Soft Phones: Software-based phones (e.g., Skype, Zoom) running on PCs and smartphones.
2. Working Steps of VoIP
1. Voice Input
2. Digitization
3. Packetization
4. Transmission
5. Reception
6. Reassembly
7. Playback
Example: Zoom call voice transmission.
3. Access Control Models
DAC: Resource owner sets permissions (e.g., Google Docs).
MAC: Admin sets access policies (e.g., military systems).
RBAC: Access based on roles (e.g., hospital system).
ABAC: Based on attributes like time, location, device.
4. Use of Access Control in Videoconferencing
Access control manages permissions in video calls (e.g., Zoom meeting host controls).
Prevents unauthorized participation or actions like screen sharing.
5. Protocols Used in VoIP
H.323, SIP (call setup), RTP (media stream), SRTP (secure RTP), TLS (transport security).
Example: Microsoft Teams uses SIP and SRTP.
6. Differences Between RTP and SIP
VoIP and Multimedia Security - Comprehensive Study Guide
RTP: Transports media; SIP: Controls session.
Example: SIP initiates WhatsApp call, RTP carries voice.
7. Techniques to Prevent Security Threats
Encryption (SRTP, TLS), Authentication (PKI), Access Control, Firewalls, IDPS, Network Segmentation.
Example: Encrypted Zoom meetings.
8. Multimedia Security
Protects audio, video, and text content.
Examples: Netflix DRM, YouTube watermarking.
9. Triple DES vs DES
Triple DES is more secure with 3-layer encryption.
Example: 3DES = 3 locks vs DES = 1 lock.
10. Encryption and Decryption Techniques
Encryption via SRTP and TLS, identity verified by digital certificates.
Example: Secure banking video chat.
11. Stages for Encryption of VoIP/Multimedia Data
1. Key Generation
2. Encoding
3. Compression
4. Encryption
5. Transmission
6. Decryption
7. Playback
Example: WhatsApp end-to-end encrypted call.