Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910463801603321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910787921403321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910807049603321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|