Chapter 9. SECURING VOIP

Securing VoIP is an important task if you are going to protect information. While organizations often think of security in terms of folders and files, information spoken over voice can be just as important. For example, think of how many times people give their credit card number, mother's maiden name, or even their social security number over the phone. What if the customer service representative on the other end is using a VoIP phone? If the media layer uses RTP, an attacker can capture the packets and gain access to all the sensitive information.

The lack of security of voice conversations, outlined in the first eight chapters, shows the need for secure VoIP networks. Many organizations like to say that VoIP networks ...

Get Hacking VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.