Common cyber attacks
There are many forms of cyber attacks that take advantage of different security breaches. Contrary to ISDN and analog telephony, eavesdropping of IP phone calls is much easier as separate access to physical phone lines is no longer required. Potential targets usually include user names and passwords but also social and business contacts. Often, eavesdropping is only the first step towards further abuse such as hijacking, fraud or Spam-over-Internet-Telephony (SPIT).
Beside misusing a hijacked system, another aim may be Denial-of-Service (DOS). DOS, or Distributed DOS (DDOS) attacks aim for malfunction of system operations or even complete system failure. Typically, targeted systems are flooded and eventually overloaded with request or response packages, stressing bandwidth and resources. As there are many different forms of cyber attacks, different security measures need to be implemented to protect both your network and IP telephony.