Chapter 3. What Can You Secure and How Can You Secure It?

The key to secure an IP Telephony network requires taking into account voice, data, and video communications as a coherent system (converged communications network) and employing a multilayered, homogeneously applied defense construct for the system infrastructure. This goes uniformly for call control, management, applications, and endpoints. The security solution should be layered with multiple controls and fortifications at various network levels. This minimizes the possibility that a single point of failure could compromise overall security. In other words, if one security layer is contravened, other defensive barriers are still available to deter the attack.

This chapter helps you ...

Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.