Case Study

Hardware/Software Setup Required

Problem Description

At NextGard only two employees could be on the phone at a time, incoming calls were met with a busy signal and the answering service didn’t route calls to individuals in the company. It was time for an innovative business VoIP solution. NextGard implemented wireless VoIP. Shortly afterward, the network was compromised.

Wireless VoIP is vulnerable to several attacks including identity and service theft, viruses and malware, DoS, and man-in-the-middle attacks. When deploying a Wireless VoIP system you need to consider its risks and take into consideration security measures to prevent the system from being attacked and misused.

As an investigator, explain how you would investigate this intrusion and in your report describe at least five measures that NextGard can implement to protect theWireless VoIP system.

Estimated completion time: 60 minutes.

Outcome

Report describing investigative procedures and at least five measures to protect a Wireless VoIP system

Validation/Evaluation

  • Investigative report with recommendations