Securing VOIP Networks: Threats, Vulnerabilities, and Countermeasures Paperback – 1 Aug 2007
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
InSecuring VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
2 VoIP Architectures and Protocols
3 Threats and Attacks
4 VoIP Vulnerabilites
5 Signaling Protection Mechanisms
6 Media Protection Mechanisms
7 Key Management Mechanisms
8 VoIP and Network Security Controls
9 A Security Framework for Enterprise VoIP Networks
10 Provider Architectures and Security
11 Enterprise Architectures and Security
About the Author
Peter Thermos is CTO of Palindrome Technologies, which provides information
security consulting services to government and commercial organizations.
Peter started his career at Bellcore (now Telcordia) as a member of the technical
staff and later as a principal technical expert on key information security and
assurance tasks. He is a frequent speaker at conferences and industry forums
including the IEEE, MIS, IEC, ISACA, VON, and others. Peter is also known
for his contributions to the security community for discovering software
vulnerabilities, the release of SiVuS (The First VoIP Vulnerability Scanner)
and the vopsecurity.org Forum. Peter holds a Masters Degree in Computer
Science from Columbia University where he is currently furthering his
Ari Takanen is founder and CTO of Codenomicon. Since 1998, Ari has
focused on information security issues in next-generation networks and security
critical environments. He began at Oulu University Secure Programming Group
(OUSPG) as a contributing member to PROTOS research that studied information
security and reliability errors in WAP, SNMP, LDAP, and VoIP implementations.
Ari and his company, Codenomicon Ltd. provide and commercialize automated
tools using a systematic approach to test a multitude of interfaces on mission-critical
software, VoIP platforms, Internet-routing infrastructure, and 3G devices.
Codenomicon and the University of Oulu aim to ensure new technologies are
accepted by the general public, by providing means of measuring and ensuring
quality in networked software. Ari has been speaking at numerous security and
testing conferences on four continents and has been invited to speak at leading
universities and international corporations.
Top Customer Reviews
The authors categorize the VoIP threats as: Service disruption and annoyance; Eavesdropping and traffic analysis; Masequerading and impersonation; Unauthorized access and finally Fraud. Each threat is described in detail, then the second half of the book goes on to the "countermeasures" theme, talking about protection of signalling and media; keying; authentication; policy and architecture.
It has an easy style, and unlike a lot of computer books, it's a relatively normal-sized paperback that you can read on the train. I learnt a lot from it.
Look for similar items by category
- Books > Computing & Internet > Digital Lifestyle > Online Shopping > Amazon
- Books > Computing & Internet > Networking & Security > Network Topics
- Books > Computing & Internet > Networking & Security > Security
- Books > Computing & Internet > Web Development
- Books > Science & Nature > Engineering & Technology > Electronics & Communications Engineering > Telephone & Wireless Technology
- Books > Scientific, Technical & Medical > Engineering > Electronics & Telecommunications Engineering
- Books > Young Adult > Computers & Internet > General