[section_tc][column_tc span=’12’ trigger_pt=’0′ duration=’1000′ delay=’0′][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′]

In this document, University of Applied Sciences FH Technikum Wien (Vienna, Austria) analyze security threats on VoIP (Voice over IP) and TETRA (Terrestrial Trunked Radio) solutions and mitigation techniques.

[nbsp_tc]

[/text_tc][spacer_tc pixels=’10’][/spacer_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′]

Conclusion

[/text_tc][spacer_tc pixels=’10’][/spacer_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′]

“We recommend Tetra for safety critical environments like vessel and port terminal operations, Airports and government emergency authorities. Any place using Tetra should have a backup plan or plan B in case of unsolved attack or disaster. Backup could be using VOIP app, GSM (Global System for Mobile communications) with push to talk feature and many other applications can be used. VoIP can be used mainly in private communication with taking all security countermeasures into action to mitigate risks on Confidentiality, Integrity and Availability.”

University of Applied Sciences FH Technikum Wien, Vienna, Austria.[br_tc]doi: 10.17706/jcp.13.3.279-286

[/text_tc][spacer_tc pixels=’10’][/spacer_tc][button_tc text=’Read the full Article’ size=’xlarge’ color=’dark’ style=’normal’ url=’https://www.shapestones.co.uk/wp-content/uploads/2018/03/VoIP-and-TETRA-Regarding-Security-jcp1303-04.pdf’ target=’_blank’ icon=’el-el_documents_alt’][/button_tc][spacer_tc pixels=’30’][/spacer_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′]

Source: Journal of Computers

[/text_tc][/column_tc][/section_tc]