Amazon cover image
Image from Amazon.com
Image from Google Jackets

Securing VoIP networks : threats, vulnerabilities, and countermeasures / Peter Thermos and Ari Takanen.

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, NJ : Addison-Wesley, c2008.Description: xxiii, 359 p. : ill. ; 24 cmISBN:
  • 0321437349 (pbk. : alk. paper)
  • 9780321437341 (pbk. : alk. paper)
Subject(s): DDC classification:
  • 004.695   22
Contents:
Introduction -- VoIP Architectures and Protocols -- Threats and Attacks -- VoIP Vulnerabilites -- Signaling Protection Mechanisms -- Media Protection Mechanisms -- Key Management Mechanisms -- VoIP and Network Security Controls -- A Security Framework for Enterprise VoIP Networks -- Pvider Architectures and Security -- Eterprise Architectures and Security.
Summary: In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 004.695 / TH.S 2008 (Browse shelf(Opens below)) 1 Available 000793

Introduction -- VoIP Architectures and Protocols -- Threats and Attacks -- VoIP Vulnerabilites -- Signaling Protection Mechanisms -- Media Protection Mechanisms -- Key Management Mechanisms -- VoIP and Network Security Controls -- A Security Framework for Enterprise VoIP Networks -- Pvider Architectures and Security -- Eterprise Architectures and Security.

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

Includes bibliographical references and index.

1

There are no comments on this title.

to post a comment.