O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Final thoughts

Abstract

This chapter is a summary of everything discussed in the preceding chapters. The biggest risk is to underestimate the tenacity and resourcefulness of the potential hacker. One must realize that VoIP security is part of the job for a VoIP administrator. As such it is tackled as part of the job. However, for the hacker or script kiddy, this is bragging rights and possibly financially beneficial if they breach VoIP systems. Therefore, they have all day and night (depending on the hacker) to attempt to breach the system, whereas the administrator has other issues to deal with on a daily basis. The system administrator is pulled in many ways to deal with downtime, new purchases, and new software loads, writing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required