Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Securing VoIP
Keeping Your VoIP Network Safe
1st Edition - November 14, 2014
Author: Regis J. Jr (Bud) Bates
Language: English
Paperback ISBN:9780124170391
9 7 8 - 0 - 1 2 - 4 1 7 0 3 9 - 1
eBook ISBN:9780124171220
9 7 8 - 0 - 1 2 - 4 1 7 1 2 2 - 0
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon yea…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
Explains the business case for securing VoIP Systems
Presents hands-on tools that show how to defend a VoIP network against attack.
Provides detailed case studies and real world examples drawn from the authors’ consulting practice.
Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
Covers the security policies and procedures that need to be in place to keep VoIP communications safe.
Information security professionals, system administrators. Security managers.
Technical editor biography
About the author
Acknowledgments
Chapter 1: Introduction
Abstract
Securing Voice over Internet Protocol (VoIP): keeping your network safe
Summary
Chapter 2: Policies
Abstract
What is the problem?
The call control channel – hijacking
Softphone issues
Denial-of-service attacks
Security concerns
Security policy needs
Vulnerability detection and auditing
Is the system vulnerable?
Chapter 3: VoIP virtual private networks (VPNs)
Abstract
Virtual private networks (VPNs) and encryption
Summary
Chapter 4: Cryptography solutions
Abstract
Cryptography solutions
Summary
Chapter 5: Authentication
Abstract
Authentication defined
Summary
Chapter 6: Other protocols SRTP, ZRTP, and SIPS
Abstract
Other protocols
Summary
Chapter 7: The business case for securing VoIP
Abstract
Before we start
Summary
Chapter 8: Approaches to VoIP security
Abstract
Before we start
Summary
Chapter 9: Final thoughts
Abstract
Before we start
Summary
Index
No. of pages: 220
Language: English
Edition: 1
Published: November 14, 2014
Imprint: Syngress
Paperback ISBN: 9780124170391
eBook ISBN: 9780124171220
R(
Regis J. Jr (Bud) Bates
Regis J. "Bud" Bates has more than 30 years of experience in Telecommunications and Information Services and has long been considered a technology "Guru." He currently contributes to these fields as an author, consultant, course developer and teacher. As an Author, Bud has written numerous books on the technologies, including "Voice and Data Communications Handbook”, and the “Broadband Telecom Handbook”. As a Consultant, with clients spanning the range of Fortune 100-500 companies, Bud has been involved in the design of major voice and data networks. His innovative ideas in implementation have been profiled in trade journals and magazines. Many of his projects deal with multiple sites and countries using Frame Relay and ATM architectures. As a Teacher, Bud has develops and conducts various public and in-house seminars ranging from a managerial overview to very technical hands-on classes on Voice over IP, WiFi Networking, WIMAX networking, DWDM and IPv6. In the recent past he has focused much of his development and training activities on the convergence of three key areas;