Voice over IP Security Excerpt

317 KB | 3 files |  PDF, DOC

In this book chapter, you'll learn about the benefits and disadvantages of using VoIP, its vulnerabilities and components. This chapter also dispels some myths about the cost-saving IP telephony solution.

VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone.

After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). Another type of security issue is how to implement lawful interception within complicated service architectures according to government requirements.

The book "Voice over IP Security," by Patrick Park, focuses on the analysis of current and future threats, the evaluation of security products, the methodologies of protection, and best practices for architecture design and service deployment. This book not only covers technology concepts and issues, but also provides detailed design solutions featuring current products and protocols so that you can deploy a secure VoIP service in the real world with confidence. This excerpt is the book's entire first chapter entitled, "Working with VoIP." In this chapter, you learn about the benefits and disadvantages of using VoIP, its vulnerabilities and components, and this chapter also dispels some myths. The content in this chapter refers to recommendations from the National Institute of Standards and Technology.

The attached ZIP file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Voice over IP Security.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

InformIT is the online presence of the family of IT publishers and brands of Pearson, the world's largest learning company. InformIT is home to the publishing imprints Addison-Wesley Professional, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall Professional, QUE and Sams. It also offer products geared toward the professional business audience from publishing partner FT Press. Whether you're looking for a book on a new technology, a helpful article, timely newsletters or access to the Safari Books Online digital library, InformIT has a solution.

All IT Downloads from InformIT» | Visit InformIT »
Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ...  More >>

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ...  More >>

Security35.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.