How to cheat at Voip security

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Descripción completa

Detalles Bibliográficos
Autor principal: Porter, Thomas, PhD (-)
Otros Autores: Gough, Michael
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Syngress c2007.
Edición:1st ed
Colección:How to Cheat
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627086906719
Tabla de Contenidos:
  • Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; SIP-Specific Attacks; Chapter 1. Introduction to VoIP Security; Introduction; The Switch Leaves the Basement; What Is VolP?; VoIP Isn't Just Another Data Protocol; Security Issues in Converged Networks; A New Security Model; Summary; Chapter 2. The Hardware Infrastructure; Introduction; Traditional PBX Systems; PBX Alternatives; VoIP Telephony and Infrastructure; Summary; Chapter 3. Architectures; Introduction; PSTN: What Is It, and How Does It Work?; PSTN Call Flow; PSTN Protocol Security; The H.323 Protocol Specification
  • The Primary H.323 VoIP-Related ProtocolsH.235 Security Mechanisms; Understanding SIP; SIP Functions and Features; SIP Architecture; Instant Messaging and SIMPLE; Summary; Chapter 4. Support Protocols; Introduction; DNS; TFTP; HTTP; SNMP; DHCP; RSVP; SDP; Skinny; Chapter 5. Threats to VoIP Communications Systems; Introduction; Denial-of-Service or VolP Service Disruption; Call Hijacking and Interception; H.323-Specific Attacks; Summary; Summary; Chapter 6. Confirm User Identity; Introduction; 802.1x and 802.11i (WPA2); EAP Authentication Types; Public Key Infrastructure
  • Minor Authentication MethodsSummary; Chapter 7. Active Security Monitoring; Introduction; Network Intrusion Detection Systems; Host-Based Intrusion Detection Systems; What Is a Penetration / Vulnerability Test?; Summary; Chapter 8. Logically Segregate Network Traffic; Introduction; VLANs; QoS and Traffic Shaping; NAT and IP Addressing; Firewalls; Access Control Lists; Summary; Chapter 9. IETF Encryption Solutions for VoIP; Introduction; Suites from the IETF; S/MIME: Message Authentication; TLS: Key Exchange and Signaling Packet Security; SRTP: Voice/Video Packet Security; Summary
  • Chapter 10. Skype SecuritySecurity; Chapter 11. Skype Firewall and Network Setup; A Word about Network Address Translation and Firewalls; What You Need to Know About Configuring Your Network Devices; Ports Required for Skype; Using Proxy Servers and Skype; How to Block Skype in the Enterprose; Endnote; Appendix A. Validate Existing Security Infrastructure; Introduction; Security Policies and Processes; Physical Security; Server Hardening; Supporting Services; Unified Network Management; Summary; Appendix B. The IP Multimedia Subsystem: True Converged Communications; Introduction
  • IMS Security ArchitectureIMS Security Issues; Summary; Related Resources; Appendix C. Regulatory Compliance; Introduction; SOX: Sarbanes-Oxley Act; GLBA: Gramm-Leach-Bliley Act; HIPAA: Health Insurance Portability and Accountability Act; CALEA: Communications Assistance for Law Enforcement Act; E911: Enhanced 911 and Related Regulations; EU and EU Member States' eCommunications Regulations; Summary; Index