📖[PDF] Securing VoIP Networks by Peter Thermos | Perlego
Get access to over 700,000 titles
Start your free trial today and explore our endless library.
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Securing VoIP Networks
Securing VoIP Networks
No longer available |Learn more
📖 Book - PDF

Securing VoIP Networks

Threats, Vulnerabilities, and Countermeasures
Peter Thermos, Ari Takanen
shareBook
Share book
pages
384 pages
language
English
format
PDF
unavailableOnMobile
Only available on web
No longer available |
Learn more
📖 Book - PDF

Securing VoIP Networks

Threats, Vulnerabilities, and Countermeasures
Peter Thermos, Ari Takanen
Book details
Table of contents
Citations

About This Book

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

1 Introduction

2 VoIP Architectures and Protocols

3 Threats and Attacks

4 VoIP Vulnerabilites

5 Signaling Protection Mechanisms

6 Media Protection Mechanisms

7 Key Management Mechanisms

8 VoIP and Network Security Controls

9 A Security Framework for Enterprise VoIP Networks

10 Provider Architectures and Security

11 Enterprise Architectures and Security

Read More

Information

Publisher
Pearson
Year
2007
ISBN
9780321524966
Topic
Computer Science
Subtopic
Computer Networking
Edition
1

Table of contents