• формат pdf
  • размер 6.65 МБ
  • добавлен 29 октября 2011 г.
Porter T. etc. Practical VoIP Security
Издательство Syngress Publishing, 2006, -592 pp.

The business of securing our private data is becoming more important and more relevant each day. The benefits of electronic communication come with proportionate risks. Critical business systems can be and are compromised regularly, and are used for illegal purposes. There are many instances of this: Seisint (Lexis-Nexis research), Choicepoint, Bank of America, PayMaxx, DSW Shoe Warehouses, Ameriprise, and T-Mobile are all recent examples.
Victims of personal data security breaches are showing their displeasure by terminating relationships with the companies that maintained their data, according to a new national survey sponsored by global law firm White & Case. The independent survey of nearly 10,000 adults, conducted by the respected privacy research organization Ponemon Institute, reveals that nearly 20 percent of respondents say they have terminated a relationship with a company after being notified of a security breach.
Companies lose customers when a breach occurs. Of the people we surveyed who received notifications, 19 percent said that they have ended their relationship with the company after they leaed that their personal information had been compromised due to security breach. A whopping 40 percent say that they are thinking about terminating their relationship, said Larry Ponemon, founder and head of the Ponemon Institute.
The practice of information security has become more complex than ever. By Gartner’s estimates, one in five companies has a wireless LAN that the CIO doesn’t know about, and 60 percent of WLANs don’t have their basic security functions enabled. Organizations that interconnect with partners are beginning to take into account the security environment of those partners. For the unprepared, security breaches and lapses are beginning to attract lawsuits. It’s going to be the next asbestos, predicts one observer.
The daily challenges a business faces—new staff, less staff, more networked applications, more business partner connections, and an even more hostile Inteet environment— should not be allowed to create more opportunities for intruders. The fact is, all aspects of commerce are perilous, and professional security administrators realize that no significant gain is possible without accepting significant risk. The goal is to intelligently, and economically, balance these risks.
This book is based on the premise that in order to secure VoIP systems and applications, you must first understand them. In addition, efficient and economical deployment of security controls requires that you understand those controls, their limitations, and their interactions with one another and other components that constitute the VoIP and supporting infrastructure.

Introduction to VoIP Security.
Asterisk Configuration and Features.
The Hardware Infrastructure.
PSTN Architecture.
H.323 Architecture.
SIP Architecture.
Other VoIP Communication Architectures.
Support Protocols.
Threats to VoIP Communications Systems.
Validate Existing Security Infrastructure.
Confirm User Identity.
Active Security Monitoring.
Logically Segregate Network Traffic.
IETF Encryption Solutions for VoIP.
Regulatory Compliance.
The IP Multimedia Subsystem: True Converged Communications.
Recommendations.
Похожие разделы
Смотрите также

Agbinya IP Communications and Services for NGN

  • формат pdf
  • размер 5.84 МБ
  • добавлен 03 января 2011 г.
Johnson I. Agbinya IP Communications and Services for NGN. Taylor&Francis, 2010, 414 pages. Offers the necessary background, training, and technical information on Internet Protocol (IP). This book discusses the primary IP protocols (IPv4 and IPv6), real-time protocols, and three major IP services (VoIP, IPTV, and Mobile TV), including IP over power line communication. It is suitable for those deploying or using IP services.

Asterisk. The Future of Telephony

  • формат pdf
  • размер 14.9 МБ
  • добавлен 22 февраля 2011 г.
Many organizations are drawn to Internet telephony's promise of cost savings, and its ability to move data, images, and voice traffic over the same connection. Asterisk, an open source system than runs on Linux, offers the best option. This guide covers installing, configuring, and integrating Asterisk with existing phone systems, without the need for additional hardware. Full Description It may be a while before Internet telephony with VoIP (Vo...

Dempster B., Garrison K. TrixBox. Made Easy

  • формат pdf
  • размер 2.89 МБ
  • добавлен 29 октября 2011 г.
Издательство Packt Publishing, 2006, -166 pp. TrixBox is a telephone system based on the popular open-source Asterisk PBX (Private Branch eXchange) software. TrixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as Internet-based telephony or VoIP (Voice over Internet Protocol). This book guides the reader in the setup of this system and how to manage the telephone system. The book b...

Hersent O. IP Telephony: Deploying VoIP Protocols and IMS Infrastructure (Second Edition)

  • формат pdf
  • размер 5.46 МБ
  • добавлен 28 апреля 2011 г.
Olivier Hersent. IP Telephony: Deploying VoIP Protocols and IMS Infrastructure. Wiley, 2010. - 472 p. - ISBN: 047066584X All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network Engineers,...

Jackson B., Clark C., Chaffin L., Long О. Asterisk Hacking

  • формат pdf
  • размер 3.34 МБ
  • добавлен 29 октября 2011 г.
Издательство Elsevier, 2007, -274 pp. For years, telephone networks were run by large companies spending billions of dollars to set up systems that connected to one another over wires, radios, and microwaves. Large machines, filling entire buildings, allowed people to talk to each other over great distances. As the computer revolution progressed, the machines got smaller and more efficient, but still they were almost exclusively the domain of a...

Kashihara S. (ed.) VoIP Technologies

  • формат pdf
  • размер 16.03 МБ
  • добавлен 17 декабря 2011 г.
Издательство InTech, 2011, -346 pp. Voice over IP (VoIP) is undoubtedly a powerful and innovative communication tool. Compared with the public switched telephone network (PSTN), VoIP off ers the benefi t of reducing communication and infrastructure cost. This makes it possible for everyone to easily keep in touch with family, friends, and clients around the world. Furthermore, VoIP has the potential to create new and att ractive communication to...

Kelly T.V. VoIP for Dummies

  • формат pdf
  • размер 5.98 МБ
  • добавлен 29 октября 2011 г.
Издательство Wiley Publishing, 2005, -313 pp. VoIP For Dummies is written for anyone who wants to reduce or eliminate their toll charges while upgrading the level of computer networking services and calling features they receive. Here you discover not only what VoIP is but how you can implement it in your company or home. (You’ll even find out whether VoIP makes a lot of sense for your situation.). VoIP has particular appeal to those who want to...

Sisalem D., Floroiu J., Kuthan J., Abend U. SIP Security

  • формат pdf
  • размер 3.54 МБ
  • добавлен 29 апреля 2011 г.
Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend. Henning Schulzrinne. SIP Security. Wiley, 2009. - 352 p. - ISBN: 1587059444 This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms...

Wallingford T. Switching to VoIP

  • формат chm
  • размер 3.42 МБ
  • добавлен 01 ноября 2011 г.
Издательство O'Reilly, 2005, -502 pp. More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing cos...

Wallingford T. VoIP Hacks

  • формат chm
  • размер 2.52 МБ
  • добавлен 01 ноября 2011 г.
Издательство O'Reilly, 2005, -326 pp. Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed...