September 2008
Intermediate to advanced
384 pages
9h 5m
English
This chapter covers the taxonomy of VoIP threats based on the following categories:
• Threats against availability
• Threats against confidentiality
• Threats against social context
The VoIP vulnerabilities that were introduced in Chapter 1, “Working with VoIP,” can be exploited to create many different kinds of threats. Attackers may disrupt media service by flooding traffic, collect privacy information by intercepting call signaling or call content, hijack calls by impersonating servers or impersonating users, make fraudulent calls by spoofing identities, and so on.
Spammers may utilize VoIP networks to deliver spam calls, instant messages, or presence information, which are more ...