Voice over IP Security [recurso electrónico] : A Comprehensive Survey of Vulnerabilities and Academic Research / by Angelos D. Keromytis.

Por: Keromytis, Angelos D [author.]Colaborador(es): SpringerLink (Online service)Tipo de material: TextoTextoSeries SpringerBriefs in Computer Science ; 1Editor: New York, NY : Springer New York, 2011Descripción: XIII, 83p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9781441998668Tema(s): Computer science | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Computer Science | Systems and Data Security | Data Encryption | Data Structures, Cryptology and Information Theory | Computer Communication NetworksFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto
Contenidos:
Acronyms -- Introduction -- Overview of VoIP Systems -- Survey and Analysis of VoIP/IMS Vulnerabilities -- Survey of VoIP Security Research Literature -- Comparative Analysis -- Conclusions -- References.
En: Springer eBooksResumen: Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos QA76.9 .A25 (Browse shelf(Abre debajo)) 1 No para préstamo 372320-2001

Acronyms -- Introduction -- Overview of VoIP Systems -- Survey and Analysis of VoIP/IMS Vulnerabilities -- Survey of VoIP Security Research Literature -- Comparative Analysis -- Conclusions -- References.

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

19

Con tecnología Koha