Securing VoIP Networks

Threats, Vulnerabilities, and Countermeasures

Nonfiction, Computers, Networking & Communications
Cover of the book Securing VoIP Networks by Peter Thermos, Ari Takanen, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Thermos, Ari Takanen ISBN: 9780132702300
Publisher: Pearson Education Publication: August 1, 2007
Imprint: Addison-Wesley Professional Language: English
Author: Peter Thermos, Ari Takanen
ISBN: 9780132702300
Publisher: Pearson Education
Publication: August 1, 2007
Imprint: Addison-Wesley Professional
Language: English

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

More books from Pearson Education

Cover of the book Succeeding with Agile: Software Development Using Scrum by Peter Thermos, Ari Takanen
Cover of the book Getting Started with Your Mac and Mac OS X Tiger by Peter Thermos, Ari Takanen
Cover of the book The Truth About Starting a Business by Peter Thermos, Ari Takanen
Cover of the book Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813 by Peter Thermos, Ari Takanen
Cover of the book The Definitive Guide to Marketing Analytics and Metrics (Collection) by Peter Thermos, Ari Takanen
Cover of the book Do You Love Shrimp? Learn All About Them by Peter Thermos, Ari Takanen
Cover of the book Development with the Force.com Platform by Peter Thermos, Ari Takanen
Cover of the book Silverlight 4 Unleashed by Peter Thermos, Ari Takanen
Cover of the book Assessing Your Innovation Capability (Chapter 4 from Disrupt Together) by Peter Thermos, Ari Takanen
Cover of the book Prioritizing Web Usability by Peter Thermos, Ari Takanen
Cover of the book The Ultimate Player's Guide to Minecraft by Peter Thermos, Ari Takanen
Cover of the book Narragansett Brewing Company by Peter Thermos, Ari Takanen
Cover of the book Windows 8.1 Absolute Beginner's Guide by Peter Thermos, Ari Takanen
Cover of the book The Truth About Maximizing College 529 Accounts by Peter Thermos, Ari Takanen
Cover of the book Microsoft Excel 2016 Step by Step by Peter Thermos, Ari Takanen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy