Chapter 4. VoIP Vulnerabilities

Chapter 3, “Threats and Attacks,” discussed threats and attacks in VoIP networks, and this chapter focuses on the actual vulnerabilities, meaning the flaws that allow a threat agent to take advantage. When explaining the vulnerabilities, we will again use some example attacks that are the real-life realizations of the more abstract threats. Security vulnerabilities in networks, in devices, and in software are the underlying reason behind security compromises. It is possible for a threat to exist even without vulnerability in the system. The attacks are still always bound to a specific vulnerability, which they exploit. When the vulnerability is fixed, the attack is mitigated. The exploit, or the attack script, ...

Get Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.