Unified Communications: Click to talk

Jul 27 2009   3:01AM GMT

Locking Down Your VoIP Network



Posted by: Tony Bradley
Tags:
assessment
audit
data
network
s3kur3
Security
tonybradley.com
voice
VoIP

It is difficult to completely isolate a voice network or VoIP server. By design they are intended to initiate and receive communications from the outside world. Attackers know this as well which is why VoIP servers represent an attractive target.

There is a variety of information that can be gathered by an attacker just by sniffing network traffic and placing calls to your network. There are also tools available to enable attackers to conduct vulnerability assessments and penetration tests against your voice network to find the weaknesses.

Read Locking Down VoIP for more about the security issues facing VoIP networks and the steps you should take to proactively identify and secure any holes in your voice infrastructure.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: