Book description
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
1 Introduction
2 VoIP Architectures and Protocols
3 Threats and Attacks
4 VoIP Vulnerabilites
5 Signaling Protection Mechanisms
6 Media Protection Mechanisms
7 Key Management Mechanisms
8 VoIP and Network Security Controls
9 A Security Framework for Enterprise VoIP Networks
10 Provider Architectures and Security
11 Enterprise Architectures and Security
Table of contents
- Title Page
- Copyright Page
- Praise for Securing VoIP Networks
- Dedication Page
- Contents
- Table of Contents
- Foreword
- Preface
- Acknowledgments
- About the Authors
- Chapter 1. Introduction
- Chapter 2. VoIP Architectures and Protocols
- Chapter 3. Threats and Attacks
- Chapter 4. VoIP Vulnerabilities
- Chapter 5. Signaling Protection Mechanisms
- Chapter 6. Media Protection Mechanisms
- Chapter 7. Key Management Mechanisms
- Chapter 8. VoIP and Network Security Controls
- Chapter 9. A Security Framework for Enterprise VoIP Networks
- Chapter 10. Provider Architectures and Security
- Chapter 11. Enterprise Architectures and Security
- Index
- Footnotes
Product information
- Title: Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
- Author(s):
- Release date: August 2007
- Publisher(s): Addison-Wesley Professional
- ISBN: None
You might also like
book
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view …
book
Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established …
book
Securing Network Infrastructure
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a …
book
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing …