menu

Securing VoIP Networks : Threats, Vulnerabilities, and Countermeasures
by Peter Thermos and Ari Takanen




Overview -

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

1 Introduction

2 VoIP Architectures and Protocols

3 Threats and Attacks

4 VoIP Vulnerabilites

5 Signaling Protection Mechanisms

6 Media Protection Mechanisms

7 Key Management Mechanisms

8 VoIP and Network Security Controls

9 A Security Framework for Enterprise VoIP Networks

10 Provider Architectures and Security

11 Enterprise Architectures and Security

  Read Full Product Description
 
eBook

Retail Price: $43.99
$39.74

(Save 10%)

Download

Format: EPUB What's this?
Language: English

This item is only available to U.S. and Canada billing addresses.

 
 

This item is Non-Returnable.
FREE Shipping for Club Members help
Not a member? Join Today!

 
 
 
 

More About Securing VoIP Networks by Peter Thermos; Ari Takanen

 
 
 

Overview

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

1 Introduction

2 VoIP Architectures and Protocols

3 Threats and Attacks

4 VoIP Vulnerabilites

5 Signaling Protection Mechanisms

6 Media Protection Mechanisms

7 Key Management Mechanisms

8 VoIP and Network Security Controls

9 A Security Framework for Enterprise VoIP Networks

10 Provider Architectures and Security

11 Enterprise Architectures and Security



This item is Non-Returnable.

 

Details

  • ISBN: 9780132702300
  • Publisher: Pearson Education
  • Imprint: Addison-Wesley Professional
  • Date: Aug 2007
 

BAM Customer Reviews