Techniques to protect the privacy




Download 0.89 Mb.
bet9/32
Sana22.07.2021
Hajmi0.89 Mb.
#15652
1   ...   5   6   7   8   9   10   11   12   ...   32
4.3 Techniques to protect the privacy
The privacy of the user needs to be particularly protected within VoIP systems. With the data no longer being transmitted over a telecommunication network which is considered secure and now transmitted over a data network which is considered insecure since no governing body over looks their securities, then the contents within the packets need to be secured to protect the privacy of the user.
A method of securing information is encryption; encryption protects data by placing it into a form which can not be easily understood by unauthorized people, but authorized people can decrypt the data placing it into its original form.

There are two main methods of encryption Symmetric Encryption sometimes known as secret key encryption and Asymmetric Encryption known as Public/Private Key encryption.




Download 0.89 Mb.
1   ...   5   6   7   8   9   10   11   12   ...   32




Download 0.89 Mb.