Chapter 9

Final thoughts

Abstract

This chapter is a summary of everything discussed in the preceding chapters. The biggest risk is to underestimate the tenacity and resourcefulness of the potential hacker. One must realize that VoIP security is part of the job for a VoIP administrator. As such it is tackled as part of the job. However, for the hacker or script kiddy, this is bragging rights and possibly financially beneficial if they breach VoIP systems. Therefore, they have all day and night (depending on the hacker) to attempt to breach the system, whereas the administrator has other issues to deal with on a daily basis. The system administrator is pulled in many ways to deal with downtime, new purchases, and new software loads, writing ...

Get Securing VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.