CHAPTER 34
SECURING VOIP
Christopher Dantos and John Mason
34.2 REGULATORY COMPLIANCE AND RISK ANALYSIS
34.2.1 Key Federal Laws and Regulations
34.2.2 Other U.S. Federal Regulations and Laws
34.2.3 State Laws and Regulations
34.2.4 International Laws and Considerations
34.3 TECHNICAL ASPECTS OF VOIP SECURITY
34.4 PROTECTING THE INFRASTRUCTURE
34.4.1 Real-Time Antivirus Scanning
34.4.2 Application Layer Gateways and Firewalls
34.4.3 Logical Separation of Voice and Data
34.4.5 Network Monitoring Tools
34.4.8 Network Address Translation and NAT-Traversal
34.5.2 Secure Real-Time Protocol
34.1 INTRODUCTION.
Whether it is referred to as Voice over Internet Protocol (VoIP) or Internet Protocol Telephony (IPT), the digitization of voice messaging has had and will continue to have an impact on society. Voice messaging is part of a shift that some are calling the Unified Messaging System (UMS).1 The future does not include separate applications for instant messaging, text messaging, voice communications, video conferencing, e-mail, and network presence. These are expected to become one application that will be shared by both the home user and large corporations. New technologies promise to empower ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.