Cover image for Practical VoIP Security.
Practical VoIP Security.
Title:
Practical VoIP Security.
Author:
Porter, CISSP, CCNP, CCDA, CCS, Thomas.
ISBN:
9780080489551
Edition:
1st ed.
Physical Description:
1 online resource (592 pages)
Contents:
Cover -- Contents -- Chapter 1 Introduction to VoIP Security -- The Switch Leaves the Basement -- What Is VoIP? -- VoIP Isn't Just Another Data Protocol -- Security Issues in Converged Networks -- A New Security Model -- Chapter 2 Asterisk Configuration and Features -- Introduction: What Are We Trying to Accomplish? -- What Functions Does a Typical PBX Perform? -- Voice Mail and Asterisk PBX -- How Is VoIP Different from Private Telephone Networks? -- What Functionality Is Gained, Degraded, or Enhanced on VoIP Networks? -- Chapter 3 The Hardware Infrastructure -- Traditional PBX Systems -- PBX Alternatives -- VoIP Telephony and Infrastructure -- Chapter 4 PSTN Architecture -- PSTN: What Is It, and How Does It Work? -- PSTN Call Flow -- PSTN Protocol Security -- Chapter 5 H.323 Architecture -- The H.323 Protocol Specification -- The Primary H.323 VoIP-Related Protocols -- H.235 Security Mechanisms -- Chapter 6 SIP Architecture -- Understanding SIP -- SIP Functions and Features -- SIP Architecture -- Instant Messaging and SIMPLE -- Chapter 7 Other VoIP Communication Architectures -- Skype -- Skype Messaging Sequence -- H.248 -- H.248 Messaging Sequence -- IAX -- IAX Messaging Sequence -- Microsoft Live Communication Server 2005 -- Chapter 8 Support Protocols -- DNS -- TFTP -- HTTP -- SNMP -- DHCP -- RSVP -- SDP -- Skinny -- Chapter 9 Threats to VoIP Communications Systems -- Denial-of-Service or VoIP Service Disruption -- Call Hijacking and Interception -- H.323-Specific Attacks -- SIP-Specific Attacks -- Chapter 10 Validate Existing Security Infrastructure -- Security Policies and Processes -- Physical Security -- Server Hardening -- Supporting Services -- Unified Network Management -- Chapter 11 Confirm User Identity -- 802.1x and 802.11i (WPA2) -- Minor Authentication Methods -- Chapter 12 Active Security Monitoring.

Network Intrusion Detection Systems -- Host-Based Intrusion Detection Systems -- Logging -- Penetration and Vulnerability Testing -- Chapter 13 Logically Segregate Network Traffic -- VLANs -- QoS and Traffic Shaping -- NAT and IP Addressing -- Firewalls -- Access Control Lists -- Chapter 14 IETF Encryption Solutions for VoIP -- Suites from the IETF -- S/MIME: Message Authentication -- TLS: Key Exchange and Signaling Packet Security -- SRTP: Voice/Video Packet Security -- Chapter 15 Regulatory Compliance -- SOX: Sarbanes-Oxley Act -- GLBA: Gramm-Leach-Bliley Act -- HIPAA: Health Insurance Portability and Accountability Act -- CALEA: Communications Assistance for Law Enforcement Act -- E911: Enhanced 911 and Related Regulations -- EU and EU Member Sates' eCommunications Regulations -- Chapter 16 The IP Multimedia Subsystem: True Converged Communications -- IMS Architecture -- Communication Flow in IMS -- IMS Security Architecture -- IMS Security Issues -- Chapter 17 Recommendations -- Reuse Existing Security Infrastructure Wisely -- Confirm User Identity -- Active Security Monitoring -- Logically Segregate VoIP from Data Traffic -- Index.
Abstract:
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive · More VoIP phone lines are being installed every day than traditional PBX phone lines · VoIP is vulnerable to the same range of attacks of any network device · VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: