The Resource How to cheat at Voip security, Thomas Porter, Michael Gough, (electronic resource)

How to cheat at Voip security, Thomas Porter, Michael Gough, (electronic resource)

Label
How to cheat at Voip security
Title
How to cheat at Voip security
Statement of responsibility
Thomas Porter, Michael Gough
Creator
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde
Member of
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Porter, Thomas
Dewey number
  • 004.69 22
  • 005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
TK5105.8865
LC item number
.P67 2007
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Gough, Michael
Series statement
How to Cheat
http://library.link/vocab/subjectName
  • Internet telephony
  • Computer networks
Label
How to cheat at Voip security, Thomas Porter, Michael Gough, (electronic resource)
Instantiates
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; SIP-Specific Attacks; Chapter 1. Introduction to VoIP Security; Introduction; The Switch Leaves the Basement; What Is VolP?; VoIP Isn't Just Another Data Protocol; Security Issues in Converged Networks; A New Security Model; Summary; Chapter 2. The Hardware Infrastructure; Introduction; Traditional PBX Systems; PBX Alternatives; VoIP Telephony and Infrastructure; Summary; Chapter 3. Architectures; Introduction; PSTN: What Is It, and How Does It Work?; PSTN Call Flow; PSTN Protocol Security; The H.323 Protocol Specification
  • The Primary H.323 VoIP-Related ProtocolsH.235 Security Mechanisms; Understanding SIP; SIP Functions and Features; SIP Architecture; Instant Messaging and SIMPLE; Summary; Chapter 4. Support Protocols; Introduction; DNS; TFTP; HTTP; SNMP; DHCP; RSVP; SDP; Skinny; Chapter 5. Threats to VoIP Communications Systems; Introduction; Denial-of-Service or VolP Service Disruption; Call Hijacking and Interception; H.323-Specific Attacks; Summary; Summary; Chapter 6. Confirm User Identity; Introduction; 802.1x and 802.11i (WPA2); EAP Authentication Types; Public Key Infrastructure
  • Minor Authentication MethodsSummary; Chapter 7. Active Security Monitoring; Introduction; Network Intrusion Detection Systems; Host-Based Intrusion Detection Systems; What Is a Penetration / Vulnerability Test?; Summary; Chapter 8. Logically Segregate Network Traffic; Introduction; VLANs; QoS and Traffic Shaping; NAT and IP Addressing; Firewalls; Access Control Lists; Summary; Chapter 9. IETF Encryption Solutions for VoIP; Introduction; Suites from the IETF; S/MIME: Message Authentication; TLS: Key Exchange and Signaling Packet Security; SRTP: Voice/Video Packet Security; Summary
  • Chapter 10. Skype SecuritySecurity; Chapter 11. Skype Firewall and Network Setup; A Word about Network Address Translation and Firewalls; What You Need to Know About Configuring Your Network Devices; Ports Required for Skype; Using Proxy Servers and Skype; How to Block Skype in the Enterprose; Endnote; Appendix A. Validate Existing Security Infrastructure; Introduction; Security Policies and Processes; Physical Security; Server Hardening; Supporting Services; Unified Network Management; Summary; Appendix B. The IP Multimedia Subsystem: True Converged Communications; Introduction
  • IMS Security ArchitectureIMS Security Issues; Summary; Related Resources; Appendix C. Regulatory Compliance; Introduction; SOX: Sarbanes-Oxley Act; GLBA: Gramm-Leach-Bliley Act; HIPAA: Health Insurance Portability and Accountability Act; CALEA: Communications Assistance for Law Enforcement Act; E911: Enhanced 911 and Related Regulations; EU and EU Member States' eCommunications Regulations; Summary; Index
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (433 p.)
Form of item
online
Isbn
9786611060268
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)318407
  • (OCoLC)476113487
  • (SSID)ssj0000173749
  • (PQKBManifestationID)12001784
  • (PQKBTitleCode)TC0000173749
  • (PQKBWorkID)10173626
  • (PQKB)10631877
  • (MiAaPQ)EBC318407
  • (EXLCZ)991000000000383534
Label
How to cheat at Voip security, Thomas Porter, Michael Gough, (electronic resource)
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; SIP-Specific Attacks; Chapter 1. Introduction to VoIP Security; Introduction; The Switch Leaves the Basement; What Is VolP?; VoIP Isn't Just Another Data Protocol; Security Issues in Converged Networks; A New Security Model; Summary; Chapter 2. The Hardware Infrastructure; Introduction; Traditional PBX Systems; PBX Alternatives; VoIP Telephony and Infrastructure; Summary; Chapter 3. Architectures; Introduction; PSTN: What Is It, and How Does It Work?; PSTN Call Flow; PSTN Protocol Security; The H.323 Protocol Specification
  • The Primary H.323 VoIP-Related ProtocolsH.235 Security Mechanisms; Understanding SIP; SIP Functions and Features; SIP Architecture; Instant Messaging and SIMPLE; Summary; Chapter 4. Support Protocols; Introduction; DNS; TFTP; HTTP; SNMP; DHCP; RSVP; SDP; Skinny; Chapter 5. Threats to VoIP Communications Systems; Introduction; Denial-of-Service or VolP Service Disruption; Call Hijacking and Interception; H.323-Specific Attacks; Summary; Summary; Chapter 6. Confirm User Identity; Introduction; 802.1x and 802.11i (WPA2); EAP Authentication Types; Public Key Infrastructure
  • Minor Authentication MethodsSummary; Chapter 7. Active Security Monitoring; Introduction; Network Intrusion Detection Systems; Host-Based Intrusion Detection Systems; What Is a Penetration / Vulnerability Test?; Summary; Chapter 8. Logically Segregate Network Traffic; Introduction; VLANs; QoS and Traffic Shaping; NAT and IP Addressing; Firewalls; Access Control Lists; Summary; Chapter 9. IETF Encryption Solutions for VoIP; Introduction; Suites from the IETF; S/MIME: Message Authentication; TLS: Key Exchange and Signaling Packet Security; SRTP: Voice/Video Packet Security; Summary
  • Chapter 10. Skype SecuritySecurity; Chapter 11. Skype Firewall and Network Setup; A Word about Network Address Translation and Firewalls; What You Need to Know About Configuring Your Network Devices; Ports Required for Skype; Using Proxy Servers and Skype; How to Block Skype in the Enterprose; Endnote; Appendix A. Validate Existing Security Infrastructure; Introduction; Security Policies and Processes; Physical Security; Server Hardening; Supporting Services; Unified Network Management; Summary; Appendix B. The IP Multimedia Subsystem: True Converged Communications; Introduction
  • IMS Security ArchitectureIMS Security Issues; Summary; Related Resources; Appendix C. Regulatory Compliance; Introduction; SOX: Sarbanes-Oxley Act; GLBA: Gramm-Leach-Bliley Act; HIPAA: Health Insurance Portability and Accountability Act; CALEA: Communications Assistance for Law Enforcement Act; E911: Enhanced 911 and Related Regulations; EU and EU Member States' eCommunications Regulations; Summary; Index
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (433 p.)
Form of item
online
Isbn
9786611060268
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)318407
  • (OCoLC)476113487
  • (SSID)ssj0000173749
  • (PQKBManifestationID)12001784
  • (PQKBTitleCode)TC0000173749
  • (PQKBWorkID)10173626
  • (PQKB)10631877
  • (MiAaPQ)EBC318407
  • (EXLCZ)991000000000383534

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...