Networking Books voip Books

Security Issues and Countermeasure for VoIP (PDF 33p)

Advertisement

Security Issues and Countermeasure for VoIP (PDF 33p)

Security Issues and Countermeasure for VoIP (PDF 33p)

This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem. At first, this paper gives a brief introduction of VoIP techniques: the network structure, network components, protocols and standards, data handling procedures, quality of service requirements, etc. Secondly, the paper discusses the VoIP specific security threats using the principle of CIA (Confidentiality, Integrity and Availability). The countermeasure to mitigate these threats is also discussed.

Author(s):

s33 Pages
Similar Books
Practical Voice Over IP Lecture notes

Practical Voice Over IP Lecture notes

This note is to make you understand what Voice over IP (VoIP) systems are, their basic architectures, and the underlying protocols and provides a basis for your own research and development in this area.

s429 Pages
VoIP   Technologies

VoIP Technologies

This book provides a collection of 15 excellent studies of Voice over IP (VoIP) technologies. This book introduces research strategies that address various issues with the aim of enhancing VoIP quality.

s346 Pages
VoIP Lecture Notes   (PDF 112P)

VoIP Lecture Notes (PDF 112P)

This note covers the following topics: protocol overview, components, H.225, RAS , Q.931, H 235V2 security, H 323 & firewalls, sccpskinny, RTP and RTCP,SIP, sample sip session, request methods, request headers, replies, SDP and SIP fire

s112 Pages
Security   Considerations for Voice Over IP Systems (PDF 99P)

Security Considerations for Voice Over IP Systems (PDF 99P)

This document is published by National Institute of Standards and Technology, this covers the following: Overview of VOIP, VOIP Equipment,  Quality of Service Issues, Overview of VOIP Data Handling ,Cost, Privacy and Legal Issues with VOIP, VOIP Security Issues,Speed and Quality,  H.323,  SIP Gateway Decomposition,  Firewalls, Address Translation, and Call Establishment,  Encryption and IPsec,  Solutions to the VOIPsec Issues,  Planning for VOIP Deployment, VOIP Risks, Threats, and Vulnerabilities.

s99 Pages

Advertisement