
Securing VoIP
Keeping Your VoIP Network Safe
- 1st Edition - November 14, 2014
- Imprint: Syngress
- Author: Regis J. Jr (Bud) Bates
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 4 1 7 0 3 9 - 1
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 1 7 1 2 2 - 0
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon yea… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteSecuring VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
- Explains the business case for securing VoIP Systems
- Presents hands-on tools that show how to defend a VoIP network against attack.
- Provides detailed case studies and real world examples drawn from the authors’ consulting practice.
- Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
- Covers the security policies and procedures that need to be in place to keep VoIP communications safe.
Information security professionals, system administrators. Security managers.
- Technical editor biography
- About the author
- Acknowledgments
- Chapter 1: Introduction
- Abstract
- Securing Voice over Internet Protocol (VoIP): keeping your network safe
- Summary
- Chapter 2: Policies
- Abstract
- What is the problem?
- The call control channel – hijacking
- Softphone issues
- Denial-of-service attacks
- Security concerns
- Security policy needs
- Vulnerability detection and auditing
- Is the system vulnerable?
- Chapter 3: VoIP virtual private networks (VPNs)
- Abstract
- Virtual private networks (VPNs) and encryption
- Summary
- Chapter 4: Cryptography solutions
- Abstract
- Cryptography solutions
- Summary
- Chapter 5: Authentication
- Abstract
- Authentication defined
- Summary
- Chapter 6: Other protocols SRTP, ZRTP, and SIPS
- Abstract
- Other protocols
- Summary
- Chapter 7: The business case for securing VoIP
- Abstract
- Before we start
- Summary
- Chapter 8: Approaches to VoIP security
- Abstract
- Before we start
- Summary
- Chapter 9: Final thoughts
- Abstract
- Before we start
- Summary
- Index
- Edition: 1
- Published: November 14, 2014
- No. of pages (Paperback): 220
- No. of pages (eBook): 220
- Imprint: Syngress
- Language: English
- Paperback ISBN: 9780124170391
- eBook ISBN: 9780124171220
R(
Regis J. Jr (Bud) Bates
VoIP,Security and WiFi.