Chapter 1

Introduction

Abstract

No matter what the reason, there are people out there trying to breach Voice over Internet Protocol (VoIP) networks. Incidents abound regarding theft of long-distance services, denial of service attacks, eavesdropping, and just plain destructive actions. To be safe, one must understand the ways and means that penetrations occur. This includes an understanding of how voice works, how the Internet Protocol (IP) works, and what the combined networks and protocols yield. From there, due diligence is needed to understand that when placed together in a VoIP system, technological as well as policy weaknesses creep into the equation. However, once these are understood, one can be prepared to protect the systems and ...

Get Securing VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.