O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1

Introduction

Abstract

No matter what the reason, there are people out there trying to breach Voice over Internet Protocol (VoIP) networks. Incidents abound regarding theft of long-distance services, denial of service attacks, eavesdropping, and just plain destructive actions. To be safe, one must understand the ways and means that penetrations occur. This includes an understanding of how voice works, how the Internet Protocol (IP) works, and what the combined networks and protocols yield. From there, due diligence is needed to understand that when placed together in a VoIP system, technological as well as policy weaknesses creep into the equation. However, once these are understood, one can be prepared to protect the systems and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required