Library items tagged:

Anonymous
Data sharing, data exchange, e-collaboration, remote collaboration there are many terms used to describe the simultaneous sharing of a document or application across a network. This is an area of communication that is full of promise and exciting possibilities. Although interactive collaboration of this kind can be useful on its own, productivity is greatly enhanced if the participants are able to talk to each other, and/or see each other. For this reason this guide considers only data sharing within videoconferencing, i.e.
Anonymous
Anonymous
This checklist is intended as a guide for site administrators. It may not be an exhaustive list of issues (this will vary depending on the site security policy, for example), but should be of assistance as a starting point. Task Note Plan deployment topology for H.323 equipment.
Anonymous
[CONVERY] Hacking Layer 2: Fun with Ethernet Switches, S. Convery, 2002,http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switche...[DPA98] The Data Protection Act 1998, ISBN 0 10 542998 8,http://www.hmso.gov.uk/acts/acts1998/19980029.htm[ECSFW] The Use of Firewalls in an Academic Environment (under revision),
Anonymous
This document has presented a discussion of the security issues involved with deploying a site H.323 videoconferencing service. While many sites may see their H.323 videoconferencing facilities function perfectly well without giving much, if any, consideration to security, security is invariably only as good as the weakest link.
Anonymous
In this section we list security-related issues to consider when deploying an H.323 service, in particular when joining the JANET H.323 service, using a studio system on the local campus. Using Janet Videoconferencing In the context of Janet Videoconferencing, that service will be responsible for:
Anonymous
It has become increasingly popular over the last few years for Janet sites to deploy firewalls; many sites have realised that their users do not require full, open access to all workstations and servers on a campus. By controlling access, staff time can be saved in chasing up ‘hacking’ incidents, and the types of service used can be kept under control. Bandwidth usage is also rising dramatically, so firewalls now have to be able to operate at gigabit speeds.
Anonymous
H.320 (ISDN) videoconferencing users have been accustomed to assuming that videoconference sessions are private, thanks to the point-to-point circuit-switched nature of their ISDN calls. The ISDN network is not so readily accessible to the public, and thus not as liable to be snooped.
Anonymous
It is theoretically possible that in an H.323 conference an ‘outsider’ could snoop the session, recording or relaying an apparently private conference (by inspecting data in transit) or that a snooper is able to silently join a conference (by connecting to an MCU). For an attacker, gathering data ‘on the wire’ is safer as it reduces the chance of detection and being later traced.
Anonymous
The security of H.323 devices falls into four broad categories: