Skip to Main Content
Securing Cisco IP Telephony Networks
book

Securing Cisco IP Telephony Networks

by Akhil Behl
August 2012
Intermediate to advanced content levelIntermediate to advanced
696 pages
17h 26m
English
Cisco Press
Content preview from Securing Cisco IP Telephony Networks

Chapter 15. Cisco IP Telephony Endpoint Security

XYZ is a large corporation with a state-of-the-art Headquarters and receives many visitors daily. One day, one such visitor, Mr. X, pays a visit to the CTO of XYZ Corp. (who happens to be his close friend) to invite him to an upcoming security conference. After calling the CTO, who will meet him in the lobby, he turns his attention to the shiny piece of hardware, which a moment ago he used to call his friend. Well, does it look too technical for him to sort out what it is? Maybe not! Mr. X is a seasoned White-Hat hacker and today he is onto something. Mr. X starts playing around with the Cisco Unified IP Phone and reaches the Network Configuration menu. To his surprise, the settings are unlocked! ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Kevin Wallace

Publisher Resources

ISBN: 9780132731096Purchase book