1. Trang chủ
  2. » Công Nghệ Thông Tin

practical voip security

592 163 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

[...]... 549 Chapter 1 Introduction to VoIP Security Solutions in this chapter: ■ The Switch Leaves the Basement ■ What Is VoIP? ■ VoIP Isn’t Just Another Data Protocol ■ Security Issues in VoIP Networks ■ A New Security Model Summary Solutions Fast Track Frequently Asked Questions 1 2 Chapter 1 • Introduction to VoIP Security Introduction The business of securing our private data... Introduction to VoIP Security 1 Introduction 2 The Switch Leaves the Basement 4 What Is VoIP? 6 VoIP Benefits 7 VoIP Protocols 9 VoIP Isn’t Just Another Data Protocol 10 Security Issues in Converged Networks 13 VoIP. .. technical editor for Chapter 15 Andy Zmolek is Senior Manager, Security Planning and Strategy at Avaya In that role, Andy drives product security architecture and strategy across Avaya’s voice and data communications products Previously at Avaya, he helped launch the Avaya Enterprise Security Practice, led several Sarbanes-Oxley-related security projects within Avaya IT, and represented Avaya in standards... frequent speaker at VoIP and networking conferences for academic and industry He recently gave a keynote speech to SNPD conference and chaired VoIP Security Panel at Supercomm05 Choon holds a B.S in Computer Science from Kyoungpook National University and an M.S in Electrical Engineering from the University of Wisconsin Choon wrote Chapters 14 and 16 Stephen Watkins (CISSP) is an Information Security Professional... eight of these years to the security field He currently serves as Information Assurance Analyst at Regent University in southeastern Virginia Before coming to Regent, he led a team of security professionals providing in-depth analysis for a global-scale government network Over the last eight years, he has cultivated his expertise with regard to perimeter security and multilevel security architecture His... their basic security functions enabled Organizations that interconnect with partners are beginning to take into www.syngress.com 3 4 Chapter 1 • Introduction to VoIP Security account the security environment of those partners For the unprepared, security breaches and lapses are beginning to attract lawsuits “It’s going to be the next asbestos,” predicts one observer The daily challenges a business faces—new... designing a security solution, aren’t always concerned about interoperability.This is actually quite ironic because these same vendors tout standards to foster interoperability An additional difference between VoIP and more common protocols is that both major VoIP protocols separate signaling and media on different channels.These channels run over dynamic IP address/port combinations.This has significant security. .. networks have become more mature, and thus, can support the quality of service that VoIP services require; and VoIP technology (particularly the products) have gotten better VoIP is attractive to organizations and to broadband end-users as they attempt to derive more value from an infrastructure that is already paid for VoIP Benefits What does converging voice and data on the same physical infrastructure... deployed Even voice www.syngress.com 7 8 Chapter 1 • Introduction to VoIP Security encryption, which in the past was limited to select organizations, can now be used by anyone in a VoIP environment An often overlooked benefit of converging data and voice is that organizational directories often are updated and consolidated as part of the VoIP deployment process.This not only enables economies in and of... Solutions Fast Track 259 Frequently Asked Questions 261 Chapter 10 Validate Existing Security Infrastructure 263 Introduction 264 Security Policies and Processes 265 Physical Security 277 Perimeter Protection 279 xxi xxii Contents Closed-Circuit Video . 372_PRAC _VoIP_ FM.qxd 3/1/06 4:39 PM Page i Thomas Porter Jan Kanclirz Andy Zmolek Antonio Rosela Michael Cross Larry Chaffin Brian Baskin Choon Shim Practical VoIP Security 372_PRAC _VoIP_ FM.qxd. companies designing VoIP, Security, WLAN, and optical networks. His next project is to write a book on Nortel VoIP and a new security architecture book he has designed for VoIP and WLAN networks. Larry. over 10 years in the networking and security industry as a consultant, speaker, and developer of security tools. Porter’s current technical interests include VoIP security, develop- ment of embedded

Ngày đăng: 25/03/2014, 12:00

TỪ KHÓA LIÊN QUAN