O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1VOIP TARGETS, THREATS, AND COMPONENTS

What worries me most is some kid in his basement, running some call generator/robodialer, taking down my contact center, just to prove a point.

—Quote from a contact center manager of a top-5 U.S. bank

Let’s start with saying that a number of terms are used to describe voice and other forms of communication. Voice itself has largely migrated from legacy time-division multiplexing (TDM) systems to Voice over IP (VoIP), Internet telephony, IP telephony, or whichever term you like to use. This book uses VoIP. Most new enterprise handsets and call control/private branch exchanges (PBXs) use VoIP. The installed base within enterprises, at least in the United States, now has more VoIP than TDM. Much of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required