Skip to Content
Voice over IP Security
book

Voice over IP Security

by Patrick Park
September 2008
Intermediate to advanced
384 pages
9h 5m
English
Cisco Press
Content preview from Voice over IP Security

This chapter covers the taxonomy of VoIP threats based on the following categories:

•  Threats against availability

•  Threats against confidentiality

•  Threats against integrity

•  Threats against social context

CHAPTER 2Voip Threat Taxonomy

The VoIP vulnerabilities that were introduced in Chapter 1, “Working with VoIP,” can be exploited to create many different kinds of threats. Attackers may disrupt media service by flooding traffic, collect privacy information by intercepting call signaling or call content, hijack calls by impersonating servers or impersonating users, make fraudulent calls by spoofing identities, and so on.

Spammers may utilize VoIP networks to deliver spam calls, instant messages, or presence information, which are more ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates
Voice Over IP

Voice Over IP

Uyless Black

Publisher Resources

ISBN: 9781587058233Purchase book