By Peter Thermos
In Securing VoIP Networks, prime specialists systematically evaluate the safety hazards and vulnerabilities linked to VoIP networks and supply confirmed, designated concepts for securing them. Drawing on case stories from their very own fieldwork, the authors deal with VoIP protection from the point of view of real-world community implementers, managers, and defense experts. The authors determine key threats to VoIP networks, together with eavesdropping, unauthorized entry, denial of carrier, masquerading, and fraud; and overview vulnerabilities in protocol layout, community structure, software program, and process configuration that position networks in danger. They talk about the benefits and tradeoffs linked to security mechanisms outfitted into SIP, SRTP, and different VoIP protocols; and assessment key administration strategies similar to MIKEY and ZRTP. subsequent, they current a whole protection framework for firm VoIP networks, and supply targeted architectural suggestions for either provider companies and company clients.
Read or Download Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures PDF
Similar network security books
Juniper Networks safe entry SSL VPN home equipment supply a whole variety of distant entry home equipment for the smallest businesses as much as the most important provider services. As a process administrator or safeguard expert, this finished configuration advisor will let you configure those home equipment to permit distant and cellular entry for workers.
This SpringerBrief explains the rising cyber threats that undermine Android software safety. It additional explores the chance to leverage the state of the art semantics and context–aware strategies to guard opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate safeguard warnings in app descriptions.
Create acceptable, security-focused company propositions that give some thought to the stability among expense, chance, and value, whereas beginning your trip to turn into a data safeguard supervisor. overlaying a wealth of data that explains precisely how the works this present day, this e-book makes a speciality of how one can organize a good details defense perform, lease the ideal humans, and strike the easiest stability among defense controls, bills, and dangers.
- IP Addressing and Subnetting, Including IPv6
- Guide to Computer Forensics and Investigations (3rd Edition)
- Dynamic Secrets in Communication Security
- Learning Network Forensics
- Cisco Designing VPN Security
- Cyber Deception: Building the Scientific Foundation
Additional resources for Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures
Examples of conﬁdential data include encryption keys, identity, presence, and location data. Analyzing and understanding how data traverses the network can identify critical weaknesses in the design. The second set of requirements relates to data integrity. Besides integrity of the data exchanged between VoIP network elements, the data that is stored in end devices may need to support data integrity. Security mechanisms for integrity include checksums, signing, and ﬁltering. Availability requirements for all services and components are the third essential objective.
In enterprise networks we typically observe two types of VoIP architectures. 323 gatekeeper or a call manager. In addition these architectures are further decomposed based on the physical and logical components that comprise them. A physical composition of the architecture describes the network elements and provides speciﬁc description of the actual network implementation (for example, routers, switches, SBCs). Whereas the logical composition of the architecture provides a generic view of the functionality that is supported by the components (for example, call agent, gatekeeper, SIP gateway).
In fact, many people believe that it is more secure than the Internet. This claim is quickly discredited when you start to analyze the security controls, or lack of, that are available in the PSTN. 8. For the United States, see the Communications Act of 1934 and its amendments, such as the Telephone Consumer Protection Act (TCPA) of 1991, the Telephone Disclosure and Dispute Resolution Act (TDDRA) of 1992, and the Telecommunications Act of 1996. See also regulations set by the speciﬁc state law, especially related to setting up telecommunications businesses, and to powers related to building wireless and wired networks over or through private or public property.