O'Reilly logo

Voice over IP Fundamentals, Second Edition by Sudipto Mukherjee, Satish Kalidindi, Manoj Bhatia, James Peters, Jonathan Davidson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Voice Security

This chapter provides an overview of typical security requirements in the context of Voice over IP (VoIP) service. You will learn about the various techniques to deploy to meet those requirements effectively and counter security threats.

Security Requirements

Before this chapter goes into the details of various techniques available to secure a VoIP network, you need to understand the problem and the set of requirements that must be met. This section outlines some of the typical security requirements. This is not an exhaustive listing. Specific VoIP services might have additional requirements:

  • Integrity—The recipient should receive the packets that the originator sends without any change to their content. A third party should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required