Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | June 20, 2014

Lauren Owen: IMG The Other Vampire



It's a wild and thundery night. Inside a ramshackle old manor house, a beautiful young girl lies asleep in bed. At the window, a figure watches... Continue »

spacer
Qualifying orders ship free.
$61.25
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Remote Warehouse Networking- Computer Security

Securing Voip Networks: Threats, Vulnerabilities, and Countermeasures

by

Securing Voip Networks: Threats, Vulnerabilities, and Countermeasures Cover

 

Synopses & Reviews

Publisher Comments:

<P style=MARGIN: 0px>In<I> Securing VoIP Networks, </I>two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. </P> <P style=MARGIN: 0px>&nbsp;</P> <P style=MARGIN: 0px>1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Introduction</P> <P style=MARGIN: 0px>2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VoIP Architectures and Protocols</P> <P style=MARGIN: 0px>3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Threats and Attacks</P> <P style=MARGIN: 0px>4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VoIP Vulnerabilites</P> <P style=MARGIN: 0px>5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SignalingProtection Mechanisms</P> <P style=MARGIN: 0px>6&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Media Protection Mechanisms</P> <P style=MARGIN: 0px>7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Key Management Mechanisms</P> <P style=MARGIN: 0px>8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VoIP and Network Security Controls</P> <P style=MARGIN: 0px>9&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A Security Framework for Enterprise VoIP Networks</P> <P style=MARGIN: 0px>10&nbsp;&nbsp;&nbsp;&nbsp; Provider Architectures and Security</P> <P style=MARGIN: 0px>11&nbsp;&nbsp;&nbsp;&nbsp; Enterprise Architectures and Security</P>

Synopsis:

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

About the Author

Peter Thermos is CTO of Palindrome Technologies, which provides information

security consulting services to government and commercial organizations.

Peter started his career at Bellcore (now Telcordia) as a member of the technical

staff and later as a principal technical expert on key information security and

assurance tasks. He is a frequent speaker at conferences and industry forums

including the IEEE, MIS, IEC, ISACA, VON, and others. Peter is also known

for his contributions to the security community for discovering software

vulnerabilities, the release of SiVuS (The First VoIP Vulnerability Scanner)

and the vopsecurity.org Forum. Peter holds a Masters Degree in Computer

Science from Columbia University where he is currently furthering his

graduate studies.

 

Ari Takanen is founder and CTO of Codenomicon. Since 1998, Ari has

focused on information security issues in next-generation networks and security

critical environments. He began at Oulu University Secure Programming Group

(OUSPG) as a contributing member to PROTOS research that studied information

security and reliability errors in WAP, SNMP, LDAP, and VoIP implementations.

Ari and his company, Codenomicon Ltd. provide and commercialize automated

tools using a systematic approach to test a multitude of interfaces on mission-critical

software, VoIP platforms, Internet-routing infrastructure, and 3G devices.

Codenomicon and the University of Oulu aim to ensure new technologies are

accepted by the general public, by providing means of measuring and ensuring

quality in networked software. Ari has been speaking at numerous security and

testing conferences on four continents and has been invited to speak at leading

universities and international corporations.

Table of Contents

Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

Chapter 2: VoIP Architectures and Protocols . . . . . . . . . . . . . . . . . .29

Chapter 3: Threats and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

Chapter 4: VoIP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . .127

Chapter 5: Signaling Protection Mechanisms . . . . . . . . . . . . . . . . .165

Chapter 6: Media Protection Mechanisms . . . . . . . . . . . . . . . . . . .217

Chapter 7: Key Management Mechanisms . . . . . . . . . . . . . . . . . . .231

Chapter 8: VoIP and Network Security Controls . . . . . . . . . . . . . .263

Chapter 9: A Security Framework for Enterprise VoIP Networks . .297

Chapter 10: Provider Architectures and Security . . . . . . . . . . . . . . .315

Chapter 11: Enterprise Architectures and Security . . . . . . . . . . . . . .334

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345

Product Details

ISBN:
9780321437341
Author:
Thermos, Peter
Publisher:
Addison-Wesley Professional
Author:
Takanen, Ari
Subject:
Networking - General
Subject:
Security measures
Subject:
Internet telephony
Subject:
Security - General
Subject:
Internet - Security
Subject:
Internet telephony - Security measures
Subject:
Networking-Computer Security
Copyright:
Edition Description:
Trade paper
Publication Date:
August 2007
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Y
Pages:
384
Dimensions:
9.2 x 6.9 x 0.9 in 612 gr

Other books you might like

  1. Asterisk: The Future of Telephony Used Trade Paper $5.95
  2. Trixbox Made Easy New Trade Paper $44.50
  3. VoIP for Dummies (For Dummies) New Trade Paper $29.99
  4. Microsoft Outlook 2007 Programming:... New Trade Paper $66.50

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Securing Voip Networks: Threats, Vulnerabilities, and Countermeasures New Trade Paper
0 stars - 0 reviews
$61.25 In Stock
Product details 384 pages Addison-Wesley Professional - English 9780321437341 Reviews:
"Synopsis" by ,

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.