Chapter 15. Cisco IP Telephony Endpoint Security

XYZ is a large corporation with a state-of-the-art Headquarters and receives many visitors daily. One day, one such visitor, Mr. X, pays a visit to the CTO of XYZ Corp. (who happens to be his close friend) to invite him to an upcoming security conference. After calling the CTO, who will meet him in the lobby, he turns his attention to the shiny piece of hardware, which a moment ago he used to call his friend. Well, does it look too technical for him to sort out what it is? Maybe not! Mr. X is a seasoned White-Hat hacker and today he is onto something. Mr. X starts playing around with the Cisco Unified IP Phone and reaches the Network Configuration menu. To his surprise, the settings are unlocked! ...

Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.