Chapter 10. Voice Security
This chapter provides an overview of typical security requirements in the context of Voice over IP (VoIP) service. You will learn about the various techniques to deploy to meet those requirements effectively and counter security threats.
Security Requirements
Before this chapter goes into the details of various techniques available to secure a VoIP network, you need to understand the problem and the set of requirements that must be met. This section outlines some of the typical security requirements. This is not an exhaustive listing. Specific VoIP services might have additional requirements:
Integrity—The recipient should receive the packets that the originator sends without any change to their content. A third party should ...
Get Voice over IP Fundamentals, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.