Skip to Main Content
Securing Cisco IP Telephony Networks
book

Securing Cisco IP Telephony Networks

by Akhil Behl
August 2012
Intermediate to advanced content levelIntermediate to advanced
696 pages
17h 26m
English
Cisco Press
Content preview from Securing Cisco IP Telephony Networks

Chapter 3. What Can You Secure and How Can You Secure It?

The key to secure an IP Telephony network requires taking into account voice, data, and video communications as a coherent system (converged communications network) and employing a multilayered, homogeneously applied defense construct for the system infrastructure. This goes uniformly for call control, management, applications, and endpoints. The security solution should be layered with multiple controls and fortifications at various network levels. This minimizes the possibility that a single point of failure could compromise overall security. In other words, if one security layer is contravened, other defensive barriers are still available to deter the attack.

This chapter helps you ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Kevin Wallace

Publisher Resources

ISBN: 9780132731096Purchase book