This chapter covers the taxonomy of VoIP threats based on the following categories:
• Threats against availability
• Threats against confidentiality
• Threats against social context
CHAPTER 2Voip Threat Taxonomy
The VoIP vulnerabilities that were introduced in Chapter 1, “Working with VoIP,” can be exploited to create many different kinds of threats. Attackers may disrupt media service by flooding traffic, collect privacy information by intercepting call signaling or call content, hijack calls by impersonating servers or impersonating users, make fraudulent calls by spoofing identities, and so on.
Spammers may utilize VoIP networks to deliver spam calls, instant messages, or presence information, which are more ...
Get Voice over IP Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.