O'Reilly logo

Hacking VoIP by Himanshu Dwivedi

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

VoIP Security Basics

Now that we have the basics of VoIP covered, let's go over some security basics. No matter what topic is being addressed, from storage to web application security, the main components of security, including authentication, authorization, availability, confidentiality, and integrity protection, will always need to be discussed.

Authentication

The authentication process in most VoIP deployment occurs at the session layer. When an endpoint connects to the network or places a phone call, authentication takes place between the VoIP phone and support servers, such as SIP Registrars, H.323 gateways, or IAX Asterisk servers. Media protocols, such as RTP or the media portion of IAX, do not require authentication because it already occurs ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required