CITATION

Collier, Mark and Endler, David. Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition. McGraw-Hill Osborne Media, 2013.

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Published:  December 2013

eISBN: 9780071798778 0071798773 | ISBN: 9780071798761

Book description:

The latest techniques for averting UC disaster

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks

  • Defend against TDoS, toll fraud, and service abuse

  • Block calling number hacks and calling number spoofing

  • Thwart voice social engineering and phishing exploits

  • Employ voice spam mitigation products and filters

  • Fortify Cisco Unified Communications Manager

  • Use encryption to prevent eavesdropping and MITM attacks

  • Avoid injection of malicious audio, video, and media files

  • Use fuzzers to test and buttress your VoIP applications

  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Keywords: HACKING, HACKING EXPOSED, SECURITY ANALYSIS, NETWORK SECURITY, VOIP SECURITY, UNIFIED COMMUNICATIONS, TDOS, TOLL FRAUD, SERVICE ABUSE, CALLING NUMBER HACK, CALLING NUMBER SPOOFING, VOICE SOCIAL ENGINEERING, PHISHING, VOICE SPAM FILTER, CISCO UNIFIED COMMUNICATIONS MANAGER, ENCRYPTION, EAVESDROPPING, MITM ATTACK, MAN IN THE MIDDLE, FUZZERS, MICROSOFT LYNC, OTT UC, CLOUD, WEBRTC, CTO, SECURELOGIX, HACKERS, HACKING, SMARTPHONES, TEXTING, SPEECH RECOGNITION, INTEGRATED VOICEMAIL, EMAIL, UC TECHNOLOGY, VOIP COMPONENTS, FOOTPRINTING, SCANNING, ENUMERATION, INFORMATION HARVESTING, INFASTRUCTURE DENIAL OF SERVICE, NETWORK EAVESDROPPING, INTERCEPTION, CISCO, CISCO UNIFIED CISCO CALL MANAGER, AVAYA COMMUNICATION MANAGER, CLOUD COMPUTING, MS UNIFIED COMMUNICATIONS CERTIFICATION, CCNP-VOICE, SANS, COMPTIA, CTP+ CONVERGENT TECHNOLOGIES, NETWORK ANALYSTS, NETWORK AUDITOR, SECURITY AUDITORS, IT PROFESSIONALS, IT, NETWORK MANAGER, NETWORK ADMINISTRATOR, MALWARE ANALYST, MALWARE, SANS INSTITUTE, SECURITY, NETWORKING, HACKING EXPOSED, HACKING EXPOSED WEB 2.0, HACKING EXPOSED VOIP, HACKING EXPOSED WINDOWS, HACKING EXPOSED WEB APPLICATIONS, HACKING EXPOSED CISCO NETWORKS, GRAY HAT HACKING, HACKING EXPOSED WIRELESS, HACKING EXPOSED COMPUTER FORENSICS, 19 DEADLY SINS OF SOFTWARE SECURITY, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, HACKING EXPOSED COMPUTER FORENSICS, HACKING EXPOSED VIRTUALIZATION & CLOUD COMPUTING, IT SECURITY METRICS, SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) IMPLEMENTATION, IT AUDITING, CISSP BOXED SET