EasyManuals Logo
Home>Matrix>IP Phone>SPARSH VP210

Matrix SPARSH VP210 User Manual

Matrix SPARSH VP210
149 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #20 background imageLoading...
Page #20 background image
13 Matrix SPARSH VP210 User Guide
Protecting Against Security Threats/Risks
As VoIP is a form of communication over the internet, the security threats and risks associated with VoIP are very
similar to those inherent to any internet application. Like spam and phishing are common forms of email abuse,
Spam over Internet Telephony (unsolicited calls and voice mail), and Spoofing (attacker masquerading as a known
or trusted source to trick the receiver into disclosing important and confidential personal information) are common
threats in VoIP. Confidentiality of the conversation is another concern. VoIP data sometimes travels unencrypted
and it is possible that someone may collect the VoIP data and reconstruct a conversation. Though at present such
activity may be a rare occurrence, it may increase as the deployment of VoIP spreads wider. Educate yourself
further on the security risks involved in using VoIP and how to protect yourself.

Table of Contents

Other manuals for Matrix SPARSH VP210

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Matrix SPARSH VP210 and is the answer not in the manual?

Matrix SPARSH VP210 Specifications

General IconGeneral
BrandMatrix
ModelSPARSH VP210
CategoryIP Phone
LanguageEnglish

Related product manuals