Chapter 8. VoIP and Network Security Controls
This chapter discusses network security controls that can be used to protect a VoIP deployment. Note that network security controls are only one dimension in the effort to secure VoIP networks. Chapter 9, “A Security Framework for Enterprise VoIP Networks,” outlines additional areas that should be considered as part of an organization’s process to secure VoIP communications. Because of the intricacies of VoIP protocols, specific mechanisms have been developed to protect against attacks that take advantage of the associated weaknesses. Therefore, it is necessary to discuss network security controls in relation to VoIP in a distinct chapter to help you understand the relationship of these controls and ...
Get Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.