O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Cisco IP Telephony: Authentication and Encryption Essentials

Have you ever thought when you share information with someone over the phone or via e-mail if all the information you send is received in its entirety at the destination—always? On second thought, did the information transmitted even reached the intended destination or was it hijacked and changed on the way? This scenario can be intimidating particularly for private conversations or business conversations in which apart from the genuine sender and receiver, a third party (our old foe hacker) becomes involved.

Throughout this book, you learned about the attacks that can be launched against your IP Telephony network and their mitigation techniques. Authentication and encryption ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required