Chapter 10. Voice Security
This chapter provides an overview of typical security requirements in the context of Voice over IP (VoIP) service. You will learn about the various techniques to deploy to meet those requirements effectively and counter security threats.
Before this chapter goes into the details of various techniques available to secure a VoIP network, you need to understand the problem and the set of requirements that must be met. This section outlines some of the typical security requirements. This is not an exhaustive listing. Specific VoIP services might have additional requirements:
Integrity—The recipient should receive the packets that the originator sends without any change to their content. A third party should ...