CHAPTER 1VOIP TARGETS, THREATS, AND COMPONENTS

What worries me most is some kid in his basement, running some call generator/robodialer, taking down my contact center, just to prove a point.

—Quote from a contact center manager of a top-5 U.S. bank

Let’s start with saying that a number of terms are used to describe voice and other forms of communication. Voice itself has largely migrated from legacy time-division multiplexing (TDM) systems to Voice over IP (VoIP), Internet telephony, IP telephony, or whichever term you like to use. This book uses VoIP. Most new enterprise handsets and call control/private branch exchanges (PBXs) use VoIP. The installed base within enterprises, at least in the United States, now has more VoIP than TDM. Much of ...

Get Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.