Book description
The latest techniques for averting UC disaster
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
- See how hackers target vulnerable UC devices and entire networks
- Defend against TDoS, toll fraud, and service abuse
- Block calling number hacks and calling number spoofing
- Thwart voice social engineering and phishing exploits
- Employ voice spam mitigation products and filters
- Fortify Cisco Unified Communications Manager
- Use encryption to prevent eavesdropping and MITM attacks
- Avoid injection of malicious audio, video, and media files
- Use fuzzers to test and buttress your VoIP applications
- Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
Table of contents
- Cover
- HACKING EXPOSED™: Unified Communications & VoIP Security Secrets & Solutions, Second Edition
- Copyright Page
- Dedication
- About the Authors
- At a Glance
- Contents
- Acknowledgments
- Introduction
- Part I Casing the Establishment
- Part II Application Attacks
- Part III Exploiting the UC Network
-
Part IV UC Session and Application Hacking
- Case Study: An Attack Against Central SIP
- 14 Fuzzing, Flooding, and Disruption of Service
- 15 Signaling Manipulation
- 16 Audio and Video Manipulation
- 17 Emerging Technologies
- Index
Product information
- Title: Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition
- Author(s):
- Release date: December 2013
- Publisher(s): McGraw-Hill
- ISBN: 9780071798778
You might also like
book
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing …
book
Securing VoIP
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to …
book
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with …
book
Reverse Deception: Organized Cyber Threat Counter-Exploitation
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts …