Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures. Ari Takanen, Peter Thermos

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures



Download Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures



Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures Ari Takanen, Peter Thermos ebook pdf
Publisher: Addison-Wesley Professional
Language: English
Page: 384
ISBN: 0321437349, 9780321437341

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

From the Back Cover

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security



MORE EBOOKS:
Download ebook: Professional English in Use Medicine
online Blogwars
Rangeland Degradation and Recovery in China's Pastoral Lands (Cabi) download ebook







Tags: Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures ebook pdf djvu epub
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures download pdf epub djvu
Download Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures free ebook pdf
Read Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures online book
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures cheap ebook for kindle and nook
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures download book
Ari Takanen, Peter Thermos ebooks
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures download pdf rapidshare mediafire fileserve 4shared torrent