Chapter 10

Security Best Practices—VoIP Implementation Policy

Abstract

This chapter wraps up all the data from previous chapters to help create the baseline for industry best practices and policy for VoIP.

Keywords

VoIP; VoIP session attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting; Policy; Industry best practices

A loud noise came from the front door as SN1P3R was attempting to gather the last of his things before making a run for it. If only he had been better prepared for this day, he might not still be home as the authorities were raiding his residence. He threw down his bag and jumped out ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.