Seven Deadliest Unified Communications Attacks provides a comprehensive view of the seven deadliest attacks against a unified communications (UC) infrastructure. It looks at the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. The book consists of seven chapters that cover the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, donat be caught defenseless again, and learn techniques to make your computer and network impenetrable... researchers at Voice over Internet Protocol (VoIP) Shield Systems issued an advisoryA stating that Microsoft Office Communicator could stop responding ... Dwww.blueboxpodcast.com/files/shmoocon_preso_voip_wifi_phone_merdinger. pdfanbsp;...
|Title||:||Seven Deadliest Unified Communications Attacks|
|Publisher||:||Syngress - 2010-06-04|