Appendix A. Cisco IP Telephony: Authentication and Encryption Essentials
Have you ever thought when you share information with someone over the phone or via e-mail if all the information you send is received in its entirety at the destination—always? On second thought, did the information transmitted even reached the intended destination or was it hijacked and changed on the way? This scenario can be intimidating particularly for private conversations or business conversations in which apart from the genuine sender and receiver, a third party (our old foe hacker) becomes involved.
Throughout this book, you learned about the attacks that can be launched against your IP Telephony network and their mitigation techniques. Authentication and encryption ...
Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.