A Strategy for Enterprise VoIP Security

A Strategy for Enterprise VoIP Security

Dwayne Stevens, David T. Green
ISBN13: 9781605669861|ISBN10: 1605669865|EISBN13: 9781605669878
DOI: 10.4018/978-1-60566-986-1.ch093
Cite Chapter Cite Chapter

MLA

Stevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." Networking and Telecommunications: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2010, pp. 1427-1436. https://doi.org/10.4018/978-1-60566-986-1.ch093

APA

Stevens, D. & Green, D. T. (2010). A Strategy for Enterprise VoIP Security. In I. Management Association (Ed.), Networking and Telecommunications: Concepts, Methodologies, Tools, and Applications (pp. 1427-1436). IGI Global. https://doi.org/10.4018/978-1-60566-986-1.ch093

Chicago

Stevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Networking and Telecommunications: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1427-1436. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-986-1.ch093

Export Reference

Mendeley
Favorite

Abstract

Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.