August 2012
Intermediate to advanced
696 pages
17h 26m
English
The key to secure an IP Telephony network requires taking into account voice, data, and video communications as a coherent system (converged communications network) and employing a multilayered, homogeneously applied defense construct for the system infrastructure. This goes uniformly for call control, management, applications, and endpoints. The security solution should be layered with multiple controls and fortifications at various network levels. This minimizes the possibility that a single point of failure could compromise overall security. In other words, if one security layer is contravened, other defensive barriers are still available to deter the attack.
This chapter helps you ...