Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms. | Praise for Securing VoIP Networks VoIP is part of the critical infrastructure. This excellent book highlights risks and describes mitigations. It could not have come more timely. Christian Wieser OUSPG At a time when organizations are increasingly embracing VoIP as a major part of their communications infrastructure the threat landscape is looking increasingly bleak. This book will enable its reader to look objectively at the real considerations surrounding securely deploying VoIP today. The authors are recognized experts in this field yet wear their learning lightly. The book is both authoritative yet easy to read. No mean feat Robert Temple Chief Security Architect BT Group The book provides a wealth of information on VoIP components and specific threats and vulnerabilities. Instead of a generic discussion it presents a comprehensive set of secu- rity techniques and architectures to address VoIP risks. John Kimmins Telcordia Fellow Recent massive Denial of Service attacks against Estonia starting April 27 2007 and YLE Finland s national public service broadcasting company starting May 15 2007 have made it clear it is better to act proactively. Read this book and prepare before it is too late. Prof. Juha Röning University of Oulu Principal Investigator of Oulu University Secure Programming Group OUSPG Head of Department of Electrical Engineering This page intentionally left blank SECURING VOIP NETWORKS This page intentionally left blank SECURING VOIP NETWORKS THREATS VULNERABILITIES AND COUNTERMEASURES Peter Thermos and Ari Takanen Upper Saddle River NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Cape Town Sydney Tokyo Singapore Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade- marks. Where those designations appear in this book and the publisher was aware of a trademark claim the designations have been printed with initial capital letters or in all .