Chapter 3. Threats and Attacks

The security of communication networks can be analyzed from several different perspectives. This and the following chapters take a closer look at VoIP security by analyzing the threats, vulnerabilities, and attacks. This chapter focuses on the threats and attacks specific to VoIP. Some of the presented attacks are studied in more detail in Chapter 4, “VoIP Vulnerabilities,” in which we analyze the technical details of vulnerabilities that enable these attacks to succeed.

Definitions of Threats and Attacks

To understand the difference between the terms threat, attack, and vulnerability, we need to establish the proper definitions in the context of VoIP security. Often, people use the terms threat and vulnerability ...

Get Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.