Practical VoIP SecurityElsevier, 31 mrt 2006 - 500 pagina's Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive · More VoIP phone lines are being installed every day than traditional PBX phone lines · VoIP is vulnerable to the same range of attacks of any network device · VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities |
Inhoudsopgave
23 | |
59 | |
Chapter 4 PSTN Architecture | 91 |
Chapter 5 H323 Architecture | 123 |
Chapter 6 SIP Architecture | 145 |
Chapter 7 Other VoIP Communication Architectures | 183 |
Chapter 8 Support Protocols | 205 |
Chapter 9 Threats to VoIP Communications Systems | 239 |
Chapter 11 Confirm User Identity | 309 |
Chapter 12 Active Security Monitoring | 343 |
Chapter 13 Logically Segregate Network Traffic | 373 |
Chapter 14 IETF Encryption Solutions for VoIP | 411 |
Chapter 15 Regulatory Compliance | 431 |
True Converged Communications | 499 |
Chapter 17 Recommendations | 519 |
549 | |
Veelvoorkomende woorden en zinsdelen
access control administrators algorithm allows applications architecture Asterisk PBX attacks authentication CALEA caller carriers certificate channel chapter Cisco client codec communications compliance components configuration connection data network database defined devices DHCP dial plan DNS server EAP-TTLS encryption endpoints extension Figure firewall Frequently Asked Questions function gatekeeper header host IETF implementation infrastructure instant messaging interface Internet IP address IP phones IPSec layer Media Gateway monitor NIDSs operating packet password PBX system port protocol proxy Proxy Server PSTN public key request response router routing S/MIME security policy sends session Session Initiation Protocol signaling Skype SNMP softphones specific spoofing SRTP standard switch syslog telecommunications telephone TFTP tion traffic transport User Agent vendors VLAN voice VoIP VoIP networks VoIP system vulnerabilities wireless
Populaire passages
Pagina 5 - Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man's telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with...