Loading…

Practical VoIP security /

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Other Authors: Porter, Thomas
Format: Electronic eBook
Language:Inglés
Published: Rockland, MA : Syngress Pub., �2006.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Introduction to VoIP security
  • Asterisk configuration and features
  • The hardware infrastructure
  • PSTN architecture
  • H.323 architecture
  • SIP architecture
  • Other VoIP communication architectures
  • Support protocols
  • Threats to VoIP communications systems
  • Validate existing security infrastructure
  • Confirm user identity
  • Active security monitoring
  • Logically segregate network traffic
  • IETF encryption solutions for VoIP
  • Regulatory compliance
  • The IP multimedia subsystem : true converged communications
  • Recommendations.