Page 197 - PYTHON-12
P. 197

2. SIP Protocol for VoIP


              The expanded form of SIP is Session Initiation Protocol. SIP is a communication protocol (more
              specifically, a signalling protocol) originally developed in 1996. It uses IP protocol that establishes,
              modifies and terminates VoIP telephone calls. It provides videoconferencing service to the users, so
              that a user can communicate with more than one person at a time. Other SIP applications include
              streaming multimedia distribution, instant messaging and information, file transfer, fax over IP and
              online games. SIP transparently supports name mapping and redirection services which support
              personal mobility.

              8.21 NETWORK SECURITY CONCEPTS


              Network is used for sharing, messaging and collaboration of data. However, more and more network
              is used for this purpose, the lesser is the security of data, either in terms of viruses or hacking and
              other cyberattacks. To prevent the network from these malicious and/or unethical practices, various
              strategies and choices are available that work as building blocks of network security. These include
              password authentication, digital signature, challenge handshake authentication protocol, etc.
              8.22 Types of Threats and Prevention

              1. Viruses

              Viruses are small programs that are written intentionally to damage the data and files on a system.
              These programs are spread from one computer system to another which interrupts the normal
              functioning of a computer. Viruses can attack any part of a computer’s software such as boot block,
              operating system, system areas, files and application program macros. Viruses are most easily
              spread with email attachments.
              Viruses are broadly classified into three types:

                (a)  File Infector Viruses: Viruses that attach themselves to a program file.

                (b)  Boot Sector Viruses: Viruses that install themselves in boot sectors of hard drive.
                (c)  Macro Viruses: They infect data files and corrupt the data.

              Characteristics of Viruses:

                (a)  Speed of a computer system becomes slower than normal.
                (b)  Computer system frequently hangs up.
                (c)  Computer restarts automatically after every few minutes.

                (d)  Various applications of computer do not function properly.
                (e)  Dialog boxes, menus and other error message windows are distorted.
              Damage caused by Viruses:

                (a)  They corrupt file allocation table which results in corrupting the entire file system.

                (b)  Replication of files occurs that decreases space in hard disk.
                                                                                                                  Computer Networks
                (c)  They can destroy system programs and files.

                (d)  They can cause destruction of specific executable files and alteration in data files resulting
                     in reinstallation of a system.

                (e)  They can format specific tracks on the disks or format the entire disks.
                                                                                                            8.43
   192   193   194   195   196   197   198   199   200   201   202