Chapter 13. Cisco Voice Gatekeeper and Cisco Unified Border Element Security
It’s 9 p.m. Steve’s cell phone rings. The call is from his credit card company’s customer service representative. She reports numerous transactions made against his credit card and wants to confirm if he is the one initiating them. Steve’s answer is obvious, “No, it’s not me!” What in the world is going on? How could his credit card details be exposed when he didn’t share them with anyone? Oh, yes! He did share the details on the phone with his kids, so they could order their school books online a couple days ago. Yet again, how could this be known to anyone?
The fact of matter is that Steve’s conversation was eavesdropped on, on the way to the intended audience. The ...
Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.