Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Voice over IP Security (Artech House Telecommunications Library)

Buy

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which everyone knows can be easily intercepted by anyone along the way. This naturally reduces the security of VoIP phone calls. While most PSTN phone users saw no justification for encrypting their calls, relying on the natural security of circuit-switched phone calls, even the less security-aware users are more likely to see a need to encrypt calls sent over the Internet.

The threat model for wiretapping VoIP is much more expansive than the one for wiretapping the PSTN. With the PSTN, the opportunities for wiretapping were in three main scenarios. First, someone could attach alligator clips to the phone wires near your home or office. Second, they could tap in at the  switch at the phone company. This would likely be done by your own domesticgovernment law enforcement agency, with the phone company’s cooperation. Third, international long-distance lines could be intercepted by intelligence agencies of either your country, the other party’s country, or a third country. It generally means a reasonably resourceful opponent.

VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe and are used by millions of individuals each day. Today, the hottest topic with engineers in the field is how to secure these networks. "Understanding Voice over IP Security" offers this critical knowledge. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and details all the key security aspects of a VoIP system, including identity, authentication, signaling, and media encryption. What's more, the book presents techniques used to combat spam and covers the future problems of spim (spam over instant messaging) and spim (spam over internet telephony).

(HTML tags aren't allowed.)

When Can Oil Economies Be Deemed Sustainable? (The Political Economy of the Middle East)
When Can Oil Economies Be Deemed Sustainable? (The Political Economy of the Middle East)
This open access book questions the stereotype depicting all Gulf (GCC) economies as not sustainable, and starts a critical discussion of what these economies and polities should do to guarantee themselves a relatively stable future.

Volatile international oil markets and the acceleration
...
OpenStack Cloud Computing Cookbook - Third Edition
OpenStack Cloud Computing Cookbook - Third Edition

Over 110 effective recipes to help you build and operate OpenStack cloud computing, storage, networking, and automation

About This Book

  • Explore many new features of OpenStack's Juno and Kilo releases
  • Install, configure, and administer core projects with the help of OpenStack Object...
Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...


Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Biocomplexity of Plant-Fungal Interactions
Biocomplexity of Plant-Fungal Interactions

Plants interact with a wide variety of organisms in their natural growing environments. Key amongst these relationships is the interplay between plants and diverse fungal species that impact plants in complex symbiotic, parasitic and pathogenic ways. Biocomplexity of Plant-Fungal Interactions explores a broad spectrum of research...

Better Business Decisions from Data: Statistical Analysis for Professional Success
Better Business Decisions from Data: Statistical Analysis for Professional Success

Everyone encounters statistics on a daily basis. They are used in proposals, reports, requests, and advertisements, among others, to support assertions, opinions, and theories. Unless you’re a trained statistician, it can be bewildering. What are the numbers really saying or not saying? Better Business Decisions from Data:...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy