Seven deadliest Unified Communications attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...

Descripción completa

Detalles Bibliográficos
Autor principal: York, Dan (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier : Burlington, MA : Syngress 2010.
Edición:1st edition
Colección:Syngress seven deadliest attacks series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627812806719
Tabla de Contenidos:
  • Front Cover; Half Title Page; Series Title Page; Title Page; Copyright Page; Table of Contents; Acknowledgments; About the Author; Introduction; Chapter 1. The Unified Communications Ecosystem; Anatomy of Attacks against the UC Ecosystem; Dangers Associated with the UC Ecosystem; DoS/Availability; Toll Fraud; Exposure of Information; Future of Attacks against the UC Ecosystem; Social Software and Services; Public Versus Private Information; Federation; Mashups and APIs; It's All about the Cloud; Bright Shiny Objects; How to Defend Your UC Ecosystem
  • Strategy #1: Identify All Ecosystem ComponentsStrategy #2: Develop Security Plans for All Components; Strategy #3: Engage in Holistic Ecosystem Testing; Summary; Chapter 2. Insecure Endpoints; Anatomy of Attacks against UC Endpoints; General DoS Attacks; Finding Endpoints to Attack; Default Passwords; Hidden Accounts; Undocumented Services; Web Exploits; Protocol Fuzzing; Local Files; Dangers of Attacks on Endpoints; Denial of Service or Availability; Toll Fraud; Eavesdropping or Exposure of Information; Annoyance; The Future of Attacks against UC Endpoints; More Powerful Endpoints
  • Migration into SoftwareCommodity Operating Systems; Heterogeneous Deployments; Mobility; Massively Distributed Endpoints; How to Defend Your Endpoints; Strategy #1: Identify All Connected Endpoints; Strategy #2: Change Default Passwords!; Strategy #3: Turn off Unnecessary Services; Strategy #4: Develop Patch Plans for All Endpoints; Strategy #5: Understand How to Update and Secure Remote Endpoints; Summary; Chapter 3. Eavesdropping and Modification; Anatomy of Eavesdropping and Modification Attacks; Getting between the Endpoints; Using Wireshark to Capture Voice
  • Using Wireshark to Capture IM TrafficCapturing Audio, Video, and IM using Other Tools; Modification Attacks; Ettercap; Dangers of Eavesdropping and Modification Attacks; Exposure of Confidential Information; Business Disruption; Annoyance; Loss of Trust; The Future of Eavesdropping and Modification Attacks; Increasing Market Size; All-IP Enterprise Networks; Cloud and Hosted Systems; Federation between UC Systems; Continued Endpoint Distribution; How to Defend against Eavesdropping and Modification Attacks; Strategy #1: Encryption of Voice and Video; Strategy #2: Encryption of IM; Summary
  • Chapter 4. Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll FraudAnatomy of Control Channel Attacks; Eavesdropping Attacks; Modification Attacks; Denial-of-Service Attacks; Elevation of Authority or Password Cracking; Fuzzing; Spam for Internet Telephony; Dangers of Control Channel Attacks; Toll Fraud; Denial of Service; Exposure of Confidential Information; Patterns in Aggregation; Annoyance; Loss of Trust; Future of Control Channel Attacks; Integration with Social Networks and Services; PSTN Bypass; How to Defend against Control Channel Attacks
  • Strategy #1: Encrypting the Control Channel