Strategies to Secure a Voice Over Internet Protocol Telephone System