VoIP Security Basics

Now that we have the basics of VoIP covered, let's go over some security basics. No matter what topic is being addressed, from storage to web application security, the main components of security, including authentication, authorization, availability, confidentiality, and integrity protection, will always need to be discussed.

Authentication

The authentication process in most VoIP deployment occurs at the session layer. When an endpoint connects to the network or places a phone call, authentication takes place between the VoIP phone and support servers, such as SIP Registrars, H.323 gateways, or IAX Asterisk servers. Media protocols, such as RTP or the media portion of IAX, do not require authentication because it already occurs ...

Get Hacking VoIP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.