O'Reilly logo

How to Cheat at VoIP Security by Michael Gough, CISSP Thomas Porter CCNP, CCDA, CCS

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Architectures

Solutions in this chapter:

Introduction

In this chapter we discuss the architecture of the Public Switched Telephone Network (PSTN), the architecture of networks based on the H.323 protocol, and the architecture of IP networks based on the Session Initiation Protocol (SIP). It’s essential to include the PSTN and its associated risks when examining VoiP security. The PSTN has evolved considerably in recent years, but the addition of VoIP services also ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required