×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Seven Deadliest Unified Communications Attacks
     

Seven Deadliest Unified Communications Attacks

by Dan York
 

See All Formats & Editions

ISBN-10: 1597495476

ISBN-13: 9781597495479

Pub. Date: 05/06/2010

Publisher: Elsevier Science

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and

Overview

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.

This book will be of interest to information security professionals of all levels as well as recreational hackers.

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, andlearn techniques to make your computer and network impenetrable

Product Details

ISBN-13:
9781597495479
Publisher:
Elsevier Science
Publication date:
05/06/2010
Pages:
224
Product dimensions:
7.40(w) x 9.10(h) x 0.60(d)

Table of Contents

Introduction Chapter 1. The Unified Communications Ecosystem Chapter 2. Insecure Endpoints Chapter 3. Eavesdropping, and Modification Chapter 4. Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud Chapter 5. SIP Trunking and PSTN Interconnection Chapter 6. Identity, Spoofing, and Vishing Chapter 7. The End of Geography

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews