当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

书名:Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

上传:石头

时间:2009-09-08

文件大小:4.7 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Peter Thermos, Ari Takanen
出版日期:August 11, 2007
出版社:Addison Wesley
页数:384
ISBN:ISBN-10: 0321437349 ISBN-13: 978-0321437341
文件格式:PDF


Product Description
In Securing VoIP Networks, two leadingexperts systematically review the security risks and vulnerabilitiesassociated with VoIP networks and offer proven, detailedrecommendations for securing them. Drawing on case studies from theirown fieldwork, the authors address VoIP security from the perspectiveof real-world network implementers, managers, and security specialists.The authors identify key threats to VoIP networks, includingeavesdropping, unauthorized access, denial of service, masquerading,and fraud; and review vulnerabilities in protocol design, networkarchitecture, software, and system configuration that place networks atrisk. They discuss the advantages and tradeoffs associated withprotection mechanisms built into SIP, SRTP, and other VoIP protocols;and review key management solutions such as MIKEY and ZRTP. Next, theypresent a complete security framework for enterprise VoIP networks, andprovide detailed architectural guidance for both service providers andenterprise users.

1 Introduction
2 VoIP Architectures and Protocols
3 Threats and Attacks
4 VoIP Vulnerabilites
5 Signaling Protection Mechanisms
6 Media Protection Mechanisms
7 Key Management Mechanisms
8 VoIP and Network Security Controls
9 A Security Framework for Enterprise VoIP Networks
10 Provider Architectures and Security
11 Enterprise Architectures and Security
About the Author
Peter Thermos is CTO of Palindrome Technologies, which provides informationsecurity consulting services to government and commercial organizations.Peter started his career at Bellcore (now Telcordia) as a member of the technicalstaff and later as a principal technical expert on key information security andassurance tasks. He is a frequent speaker at conferences and industry forumsincluding the IEEE, MIS, IEC, ISACA, VON, and others. Peter is also knownfor his contributions to the security community for discovering softwarevulnerabilities, the release of SiVuS (The First VoIP Vulnerability Scanner)and the vopsecurity.org Forum. Peter holds a Masters Degree in ComputerScience from Columbia University where he is currently furthering hisgraduate studies.
Ari Takanen is founder and CTO of Codenomicon. Since 1998, Ari hasfocused on information security issues in next-generation networks and securitycritical environments. He began at Oulu University Secure Programming Group(OUSPG) as a contributing member to PROTOS research that studied informationsecurity and reliability errors in WAP, SNMP, LDAP, and VoIP implementations.Ari and his company, Codenomicon Ltd. provide and commercialize automatedtools using a systematic approach to test a multitude of interfaces on mission-criticalsoftware, VoIP platforms, Internet-routing infrastructure, and 3G devices.Codenomicon and the University of Oulu aim to ensure new technologies areaccepted by the general public, by providing means of measuring and ensuringquality in networked software. Ari has been speaking at numerous security andtesting conferences on four continents and has been invited to speak at leadinguniversities and international corporations.
Tags:networksSecuringThreatsvoip


相关书籍

  • How to Cheat at Voip Security
  • How to Cheat at Voip Security
  • Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detectio
  • Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detectio
  • How to Cheat at Voip Security

评论 (0) All

登陆 | 还没注册?