
189
10Chapter
SIP Security
SIP security threats fall into one of four different categories. e first set of threats
results from the vulnerabilities of SIP. ese threats take advantage of the flaws
in the definition of SIP in terms of its characteristics, functionality, and descrip-
tion. e second set of threats results from its interoperation with other protocols.
is relates to SIP interfacing with other protocols. e third group is threats that
exploit the operational details of SIP, including mandatory, nonmandatory, and/or
optional requirements of SIP. e fourth type of threat results from the inherent
security risks associated with the system ...