Read Online Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books

By Tanya Richards on Friday, May 10, 2019

Read Online Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books



Download As PDF : Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books

Download PDF Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security


Read Online Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books


"There are many benefits to VoIP and IP-based communications. However, relying on your network infrastructure to transport your telephone communications renders your telecommunications vulnerable to virtually all of the same issues and threats as your network. On top of that, there are also unique attack vectors introduced by VoIP. As organizations race to deploy VoIP and experience the benefits, most would probably benefit from slowing down to consider the security implications and develop appropriate controls to protect their communications.

In Security VoIP Networks: Threats, Vulnerabilities, and Countermeasures, authors Peter Thermos and Ari Takanen do a superb job of illustrating the insecurities of VoIP. Not to suggest that it is just so inherently insecure that it should never be used, but C-level execs, and IT managers and administrators should be familiar with the information in this book before moving forward to deploy VoIP.

Chapter 2, 'VoIP Architecture and Protocols', provides a solid foundation on the basic components and technologies that make up VoIP. It is the next couple chapters that are the most valuable though. In 'VoIP Vulnerabilities', and 'Threats and Attacks', Thermos and Takanen demonstrate the weaknesses of VoIP and the simplicity with which VoIP communications can be disrupted or intercepted if not set up properly.

Chapters 5 - 8 analyze different security controls and protection mechanisms. One issue I had was that it was difficult to draw a one-to-one correlation and find the security countermeasures to defend against attacks identified earlier. The information is solid though.

The book wraps up by providing a look at what a VoIP security framework should entail, and architecture diagrams to help you create and deploy a secure VoIP solution."

Product details

  • Paperback 384 pages
  • Publisher Addison-Wesley Professional; 1 edition (August 11, 2007)
  • Language English
  • ISBN-10 9780321437341
  • ISBN-13 978-0321437341
  • ASIN 0321437349

Read Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books

Tags : Securing VoIP Networks Threats, Vulnerabilities, and Countermeasures [Peter Thermos, Ari Takanen] on . <P style= MARGIN 0px >In<I> Securing VoIP Networks, </I>two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven,Peter Thermos, Ari Takanen,Securing VoIP Networks Threats, Vulnerabilities, and Countermeasures,Addison-Wesley Professional,0321437349,Security - Online Safety Privacy,Internet telephony - Security measures,Internet telephony;Security measures.,COMPUTERS / Networking / Vendor Specific,COMPUTERS / Security / General,COMPUTERS / Security / Online Safety Privacy,Computer Books Internet General,Computer Data Security,Computers,Computers - Computer Security,Computers/Networking - General,Data security data encryption,Internet,Internet telephony,Network security,Networking - General,Security - General,Security measures

Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books Reviews :


Securing VoIP Networks Threats Vulnerabilities and Countermeasures Peter Thermos Ari Takanen 0785342437348 Books Reviews


  • This is a Great book for fundamental understanding of VoIP security. I recommend this book for anyone looking to learn baseline technology.
  • A quick read of the first 1/3 of the book will cure you of your doubts VoIP can be attacked forever! It was almost painful reading; exploit approach after exploit approach, but I mean that in a good way like the pain you feel in your muscles after exercise.

    I was excited when this book came out, I have been following some of the author's Thermos and Takanen work and I think they were the perfect team for this book.

    I feel that Chapter 3 and 4, threats and attacks and VoIP vulnerabilities are by far the strongest chapters and they alone are worth the purchase price of the book.

    The majority of the rest of the book is focused on mitigating controls and it is solid writing, solid research, but not quite at the level of the pen test side of the book.

    Chapters 10 and 11 are invaluable to anyone considering a VoIP deployment including a deployment where you are depending on a service provider. The charts and diagrams are clear and easy to understand, the whole book team is to be commended for that, this is a complex subject.

    If you are even thinking about VoIP, you should read this book.
  • There are many benefits to VoIP and IP-based communications. However, relying on your network infrastructure to transport your telephone communications renders your telecommunications vulnerable to virtually all of the same issues and threats as your network. On top of that, there are also unique attack vectors introduced by VoIP. As organizations race to deploy VoIP and experience the benefits, most would probably benefit from slowing down to consider the security implications and develop appropriate controls to protect their communications.

    In Security VoIP Networks Threats, Vulnerabilities, and Countermeasures, authors Peter Thermos and Ari Takanen do a superb job of illustrating the insecurities of VoIP. Not to suggest that it is just so inherently insecure that it should never be used, but C-level execs, and IT managers and administrators should be familiar with the information in this book before moving forward to deploy VoIP.

    Chapter 2, 'VoIP Architecture and Protocols', provides a solid foundation on the basic components and technologies that make up VoIP. It is the next couple chapters that are the most valuable though. In 'VoIP Vulnerabilities', and 'Threats and Attacks', Thermos and Takanen demonstrate the weaknesses of VoIP and the simplicity with which VoIP communications can be disrupted or intercepted if not set up properly.

    Chapters 5 - 8 analyze different security controls and protection mechanisms. One issue I had was that it was difficult to draw a one-to-one correlation and find the security countermeasures to defend against attacks identified earlier. The information is solid though.

    The book wraps up by providing a look at what a VoIP security framework should entail, and architecture diagrams to help you create and deploy a secure VoIP solution.
  • This book was useful for understanding VoIP security protocols, including somewhat obscure ones such as SIP over TLS. The threats section looks like it will be valuable for convincing managers to take VoIP security seriously. I used the book to evaluate Microsoft's new VoIP products (I work for an analyst firm, Directions on Microsoft, that covers the company) and found it very helpful.

    I wish that the book were organized to relate the threats and attacks to the countermeasures more clearly -- I find it easier to understand a security protocol when someone shows me what attacks it can and can't block. I'd like to see a book like this that focuses on SIP/RTP VoIP in more depth and leaves out H.323 -- I know H.323 is more widely deployed, but SIP/RTP seems to be where the big vendors are headed. Still, these are minor quibbles -- I would recommend this book to anyone who needs an introduction to VoIP network security.

    Rob Helm