skip to content
Securing VoIP networks : threats, vulnerabilities, and countermeasures Preview this item
ClosePreview this item
Checking...

Securing VoIP networks : threats, vulnerabilities, and countermeasures

Author: Peter Thermos; Ari Takanen
Publisher: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Thermos, Peter.
Securing VoIP networks.
Upper Saddle River, N.J. : Addison-Wesley, 2007
(DLC) 2007017689
(OCoLC)123955114
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Peter Thermos; Ari Takanen
ISBN: 9780321437341 0321437349 9780132702300 0132702304
OCLC Number: 172622934
Description: 1 online resource
Contents: Ch. 1. Introduction --
Ch. 2. VoIP architectures and protocols --
Ch. 3. Threats and attacks --
Ch. 4. VoIP vulnerabilities --
Ch. 5. Signaling protection mechanisms --
Ch. 6. Media protection mechanisms --
Ch. 7. Key management mechanisms --
Ch. 8. VoIP and network security controls --
Ch. 9. A security framework for enterprise VoIP networks --
Ch. 10. Provider architectures and security --
Ch. 11. Enterprise architectures and security.
Responsibility: Peter Thermos, Ari Takanen.
More information:

Abstract:

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/172622934<\/a>> # Securing VoIP networks : threats, vulnerabilities, and countermeasures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:MediaObject<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"172622934<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Place\/upper_saddle_river_n_j<\/a>> ; # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/621.385\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Topic\/internet_telephony_security_measures<\/a>> ; # Internet telephony--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/4380263<\/a>> ; # Ari Takanen<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/38823798<\/a>> ; # Peter Thermos<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Ch. 1. Introduction -- Ch. 2. VoIP architectures and protocols -- Ch. 3. Threats and attacks -- Ch. 4. VoIP vulnerabilities -- Ch. 5. Signaling protection mechanisms -- Ch. 6. Media protection mechanisms -- Ch. 7. Key management mechanisms -- Ch. 8. VoIP and network security controls -- Ch. 9. A security framework for enterprise VoIP networks -- Ch. 10. Provider architectures and security -- Ch. 11. Enterprise architectures and security.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/858246475<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/123955114<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Securing VoIP networks : threats, vulnerabilities, and countermeasures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"172622934<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/172622934#PublicationEvent\/upper_saddle_river_n_j_addison_wesley_2007<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Agent\/addison_wesley<\/a>> ; # Addison-Wesley<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/proquest.safaribooksonline.com\/9780321437341<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.safaribooksonline.com\/library\/view\/\/9780321437341\/?ar<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/archive.org\/details\/securingvoipnetw0000ther<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/toc\/ecip0716\/2007017689.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.tech.safaribooksonline.de\/9780321437341<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/openlibrary.org\/books\/OL18498154M<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780321437341<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780132702300<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/172622934<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/621.385\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Agent\/addison_wesley<\/a>> # Addison-Wesley<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Addison-Wesley<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Place\/upper_saddle_river_n_j<\/a>> # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Upper Saddle River, N.J.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Topic\/internet_telephony_security_measures<\/a>> # Internet telephony--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh98004350<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet telephony--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nju<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/38823798<\/a>> # Peter Thermos<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Thermos<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Peter<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Peter Thermos<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/4380263<\/a>> # Ari Takanen<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Takanen<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ari<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ari Takanen<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780132702300<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0132702304<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780132702300<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780321437341<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0321437349<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780321437341<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/123955114<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Securing VoIP networks.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/172622934<\/a>> ; # Securing VoIP networks : threats, vulnerabilities, and countermeasures<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/172622934<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/172622934<\/a>> ; # Securing VoIP networks : threats, vulnerabilities, and countermeasures<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-10-19<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/172622934#PublicationEvent\/upper_saddle_river_n_j_addison_wesley_2007<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Place\/upper_saddle_river_n_j<\/a>> ; # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/858246475#Agent\/addison_wesley<\/a>> ; # Addison-Wesley<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n