O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Cisco Voice Gatekeeper and Cisco Unified Border Element Security

It’s 9 p.m. Steve’s cell phone rings. The call is from his credit card company’s customer service representative. She reports numerous transactions made against his credit card and wants to confirm if he is the one initiating them. Steve’s answer is obvious, “No, it’s not me!” What in the world is going on? How could his credit card details be exposed when he didn’t share them with anyone? Oh, yes! He did share the details on the phone with his kids, so they could order their school books online a couple days ago. Yet again, how could this be known to anyone?

The fact of matter is that Steve’s conversation was eavesdropped on, on the way to the intended audience. The ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required