Hacking VoIP Protocols, Attacks, and Countermeasures
Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators mu...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Francisco :
No Starch Press
2008.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627612406719 |
Sumario: | Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses again |
---|---|
Notas: | Description based upon print version of record. |
Descripción Física: | 1 online resource (236 p.) |
ISBN: | 9781593273095 |