HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
1 Introduction
2 VoIP Architectures and Protocols
3 Threats and Attacks
4 VoIP Vulnerabilites
5 Signaling Protection Mechanisms
6 Media Protection Mechanisms
7 Key Management Mechanisms
8 VoIP and Network Security Controls
9 A Security Framework for Enterprise VoIP Networks
10 Provider Architectures and Security
11 Enterprise Architectures and Security
Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Chapter 2: VoIP Architectures and Protocols . . . . . . . . . . . . . . . . . .29
Chapter 3: Threats and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Chapter 4: VoIP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . .127
Chapter 5: Signaling Protection Mechanisms . . . . . . . . . . . . . . . . .165
Chapter 6: Media Protection Mechanisms . . . . . . . . . . . . . . . . . . .217
Chapter 7: Key Management Mechanisms . . . . . . . . . . . . . . . . . . .231
Chapter 8: VoIP and Network Security Controls . . . . . . . . . . . . . .263
Chapter 9: A Security Framework for Enterprise VoIP Networks . .297
Chapter 10: Provider Architectures and Security . . . . . . . . . . . . . . .315
Chapter 11: Enterprise Architectures and Security . . . . . . . . . . . . . .334
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345