O'Reilly logo

Hacking VoIP by Himanshu Dwivedi

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. AUDITING VOIP FOR SECURITY BEST PRACTICES

Auditing VoIP networks is an important step in securing them. In most VoIP networks, there are many moving parts that may have a negative effect on security. For example, the use of strong session security may be negated by poor media security. Furthermore, encrypted media communication may be invalidated if session setup protocols send the encryption key in cleartext. Each aspect of VoIP, including the network, devices, software, and protocols, should be analyzed in terms of security. A poor security setting on one entity can affect the strong security of others. Auditing VoIP networks, identifying security gaps, and then implementing solutions that mitigate exposed risk is often the best ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required