gogogo
Syndetics cover image
Image from Syndetics

Seven deadliest Unified Communications attacks [electronic book] / Dan York ; technical editor, Dustin D. Trammell.

By: Contributor(s): Material type: TextTextSeries: Syngress seven deadliest attacks seriesPublication details: Burlington, MA : Syngress, c2010.Description: xxiv, 164 p. : ill. ; 24 cmISBN:
  • 1597495476
  • 9781597495479
Subject(s): Genre/Form: Additional physical formats: No titleOnline resources:
Contents:
Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.
The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index.
Summary: Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
No physical items for this record

Enhanced descriptions from Syndetics:

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.

This book will be of interest to information security professionals of all levels as well as recreational hackers.

Includes index.

Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.

The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index.

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on May 12, 2010). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Introduction
  • Chapter 1 The Unified Communications Ecosystem
  • Chapter 2 Insecure Endpoints
  • Chapter 3 Eavesdropping, and Modification
  • Chapter 4 Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud
  • Chapter 5 SIP Trunking and PSTN Interconnection
  • Chapter 6 Identity, Spoofing, and Vishing
  • Chapter 7 The End of Geography

Author notes provided by Syndetics

Dan York (CISSP) is the Best Practices Chair for the VOIP Security Alliance (VOIPSA) as well as the producer of "Blue Box: The VoIP Security Podcast" where since October 2005 he and co-host Jonathan Zar have discussed VOIP security news and interviewed people involved in the field. Dan is employed as the Director of Conversations at Voxeo Corporation heading up the company's communication through both traditional and new/social media. Previously, Dan served in Voxeo's Office of the CTO focused on analyzing/evaluating emerging technology, participating in industry standards bodies and addressing VoIP security issues. Since the mid-1980s Dan has been working with online communication technologies and helping businesses and organizations understand how to use and participate in those new media. Dan frequently presents at conferences, has authored multiple books on Linux and networking and writes extensively online at sites such as www.voipsa.org/blog and www.disruptivetelephony.com.

Powered by Koha