Porter Cissp Ccnp Ccda Ccs / Porter / Gough | How to Cheat at VoIP Security | E-Book | sack.de
E-Book

E-Book, Englisch, 432 Seiten

Porter Cissp Ccnp Ccda Ccs / Porter / Gough How to Cheat at VoIP Security


1. Auflage 2011
ISBN: 978-0-08-055353-5
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

E-Book, Englisch, 432 Seiten

ISBN: 978-0-08-055353-5
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
* VoIP Isn't Just Another Data Protocol
IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Understand why.
* What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?
Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.
* The Security Considerations of Voice Messaging
Learn about the types of security attacks you need to protect against within your voice messaging system.
* Understand the VoIP Communication Architectures
Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.
* The Support Protocols of VoIP Environments
Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.
* Securing the Whole VoIP Infrastructure
Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.
* Authorized Access Begins with Authentication
Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.
* Understand Skype Security
Skype does not log a history like other VoIP solutions, understand the implications of conducting business over a Skype connection.
* Get the Basics of a VoIP Security Policy
Use a sample VoIP Security Policy to understand the components of a complete policy.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently
*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs
*Avoid the time drains associated with securing VoIP

Porter Cissp Ccnp Ccda Ccs / Porter / Gough How to Cheat at VoIP Security jetzt bestellen!

Weitere Infos & Material


1;Front Cover;1
2;How to Cheat at: VoIP Security;4
3;Copyright Page;5
4;Contents;12
5;Chapter 1. Introduction to VoIP Security;22
5.1;Introduction;23
5.2;The Switch Leaves the Basement;25
5.3;What Is VolP?;27
5.4;VoIP Isn't Just Another Data Protocol;30
5.5;Security Issues in Converged Networks;32
5.6;A New Security Model;36
5.7;Summary;37
6;Chapter 2. The Hardware Infrastructure;40
6.1;Introduction;41
6.2;Traditional PBX Systems;42
6.3;PBX Alternatives;51
6.4;VoIP Telephony and Infrastructure;52
6.5;Summary;65
7;Chapter 3. Architectures;66
7.1;Introduction;67
7.2;PSTN: What Is It, and How Does It Work?;67
7.3;PSTN Call Flow;82
7.4;PSTN Protocol Security;85
7.5;The H.323 Protocol Specification;88
7.6;The Primary H.323 VoIP-Related Protocols;89
7.7;H.235 Security Mechanisms;99
7.8;Understanding SIP;103
7.9;SIP Functions and Features;108
7.10;SIP Architecture;111
7.11;Instant Messaging and SIMPLE;126
7.12;Summary;130
8;Chapter 4. Support Protocols;132
8.1;Introduction;133
8.2;DNS;133
8.3;TFTP;139
8.4;HTTP;141
8.5;SNMP;144
8.6;DHCP;147
8.7;RSVP;150
8.8;SDP;153
8.9;Skinny;156
8.10;Summary;178
9;Chapter 5. Threats to VoIP Communications Systems;162
9.1;Introduction;163
9.2;Denial-of-Service or VolP Service Disruption;163
9.3;Call Hijacking and Interception;169
9.4;H.323-Specific Attacks;176
9.5;SIP-Specific Attacks;15
9.6;Summary;178
10;Chapter 6. Confirm User Identity;180
10.1;Introduction;181
10.2;802.1x and 802.11i (WPA2);184
10.3;EAP Authentication Types;188
10.4;Public Key Infrastructure;196
10.5;Minor Authentication Methods;203
10.6;Summary;204
11;Chapter 7. Active Security Monitoring;206
11.1;Introduction;207
11.2;Network Intrusion Detection Systems;208
11.3;Host-Based Intrusion Detection Systems;217
11.4;What Is a Penetration / Vulnerability Test?;221
11.5;Summary;226
12;Chapter 8. Logically Segregate Network Traffic;228
12.1;Introduction;229
12.2;VLANs;230
12.3;QoS and Traffic Shaping;235
12.4;NAT and IP Addressing;236
12.5;Firewalls;246
12.6;Access Control Lists;256
12.7;Summary;258
13;Chapter 9. IETF Encryption Solutions for VoIP;260
13.1;Introduction ;261
13.2;Suites from the IETF;261
13.3;S/MIME: Message Authentication;262
13.4;TLS: Key Exchange and Signaling Packet Security;265
13.5;SRTP: Voice/Video Packet Security;268
13.6;Summary;272
14;Chapter 10. Skype Security;274
14.1;Security;275
15;Chapter 11. Skype Firewall and Network Setup;284
15.1;A Word about Network Address Translation and Firewalls;290
15.2;What You Need to Know About Configuring Your Network Devices;290
15.3;Ports Required for Skype;292
15.4;Using Proxy Servers and Skype;297
15.5;How to Block Skype in the Enterprose;303
15.6;Endnote;304
16;Appendix A. Validate Existing Security Infrastructure;306
16.1;Introduction;307
16.2;Security Policies and Processes;308
16.3;Physical Security;318
16.4;Server Hardening;322
16.5;Supporting Services;334
16.6;Unified Network Management;338
16.7;Summary;342
17;Appendix B. The IP Multimedia Subsystem: True Converged Communications;344
17.1;Introduction;345
17.2;IMS Security Architecture;346
17.3;IMS Security Issues;346
17.4;Summary;353
17.5;Related Resources;353
18;Appendix C. Regulatory Compliance;354
18.1;Introduction;355
18.2;SOX: Sarbanes–Oxley Act;357
18.3;GLBA: Gramm–Leach–Bliley Act;363
18.4;HIPAA: Health Insurance Portability and Accountability Act;372
18.5;CALEA: Communications Assistance for Law Enforcement Act;381
18.6;E911: Enhanced 911 and Related Regulations;398
18.7;EU and EU Member States' eCommunications Regulations;405
18.8;Summary;411
19;Index;412


Contributors
Brian Baskin (MCR CTT +) is a researcher and developer for Computer Sciences Corporation, on contract to the Defense Cyber Crime Center’s (DC3) Computer Investigations Training Program (DCITP). Here, he researches, develops, and instructs computer forensic courses for members of the military and law enforcement. Brian currently specializes in Linux/Solaris intrusion investigations, as well as investigations of various network applications. He has designed and implemented networks to be used in scenarios, and he has also exercised penetration-testing procedures. Brian has been instructing courses for six years, including presentations at the annual DoD Cyber Crime Conference. He is an avid amateur programmer in many languages, beginning when his father purchased QuickC for him when he was 11, and he has geared much of his life around the implementations of technology. He has also been an avid Linux user since 1994 and enjoys a relaxing terminal screen whenever he can. He has worked in networking environment for over 10 years from small Novell networks to large, mission-critical, Windows-based networks. Brian lives in the Baltimore, MD, area with his lovely wife and son. He is also the founder, and president, of the Lightning Owners of Maryland car club. Brian is a motor sports enthusiast and spends much of his time building and racing his vehicles. He attributes a great deal of his success to his parents, who relinquished their household 80286 PC to him at a young age and allowed him the freedom to explore technology. Joshua Brashars is a security researcher for the External Threat Assessment Team at Secure Science Corporation. Before that, Joshua spent many years in the telecommunications industry as an implementation consultant for traditional and VoIP PBX systems. Joshua would like to extend heartfelt thanks to his family, friends, Lance James and SSC, Johnny Long and all of johnny.ihackstuff.com, and a special nod to Natas, Strom Carlson, and lucky225 for fueling the fire in his passion for telephone systems. Michael Cross (MCSE, MCP + I, CNA, Network +) is an Internet Specialist/Computer Forensic Analyst with the Niagara Regional Police Service (NRPS). He performs computer forensic examinations on computers involved in criminal investigation. He also has consulted and assisted in cases dealing with computer-related/Internet crimes. In addition to designing and maintaining the NRPS Web site at www.nrps.com and the NRPS intranet, he has provided support in the areas of programming, hardware, and network administration. As part of an information technology team that provides support to a user base of more than 800 civilian and uniform users, he has a theory that when the users carry guns, you tend to be more motivated in solving their problems. Michael also owns Knight Ware (www.knightware.ca), which provides computer-related services such as Web page design, and Bookworms (www.bookworms.ca), where you can purchase collectibles and other interesting items online. He has been a freelance writer for several years, and he has been published more than three dozen times in numerous books and anthologies. He currently resides in St. Catharines, Ontario, Canada, with his lovely wife, Jennifer, his darling daughter, Sara, and charming son, Jason. Dan Douglass (MCSE + I, MCDBA, MCSD, MCT, Brainbench .Net Programmer Job Role) is the Special Projects Manager with a cutting-edge medical software company in Dallas, TX. His latest venture is as President/Owner of a new technology firm, Code Hatchery. He currently provides software development skills and internal training and integration solutions, as well as peer guidance for technical skills development. Dan’s specialties include enterprise application integration and design; HL7, XML, XSL, C++, C#, JavaScript, Visual Basic, and Visual Basic.Net; database design and administration; Back Office and .NET Server platforms; Network design, including LAN and WAN solutions; all Microsoft operating systems; and Mac OS X, FreeBSD, and Linux. When he has free time, Dan teaches programming, database design, and database administration at a prominent Dallas university. Dan is a former U.S. Navy Nuclear Submariner and lives in Plano, TX, with his very supportive and understanding wife, Tavish. Dan wishes to extend special thanks to his mother-in-law, Sue Moffett, for all her love and support through the years. Bradley Dunsmore (CCNR, CCDR, CCSR, INFOSEC, MCSE + I, MCDBA) is a Software/QA engineer for the Voice Technology Group at Cisco Systems Inc. He is part of the Golden Bridge solution test team for IPT based in RTP, NC. His responsibilities include the design, deployment, testing, and troubleshooting of Cisco’s enterprise voice portfolio. His focus area is the integration of Cisco’s network security product line in an enterprise voice environment. Bradley has been working with Cisco’s network security product line for four years, and he is currently working on his CCIE lab for Security. Prior to his six years at Cisco, Bradley worked for Adtran, for Bell Atlantic, and as a network integrator in Virginia Beach, VA. Bradley has authored, coauthored, or edited several books for Syngress Publishing and Cisco Press for network security, telecommunication, and general networking. He would like to thank his fiancée, Amanda, for her unwavering support in everything that he does. Her support makes all of this possible. Michael Gough is host and webmaster of www.SkypeTips.com, which was launched in January 2005 and receives more than 100,000 hits per month, and www.VideoCallTips.com, which receives more than 30,000 hits per month. Michael writes articles on Skype and related issues. He also explains Skype’s options and instructions to users so that they can practically apply Skype at home and in the workplace. Michael also evaluates products used with Skype and provides feedback to the vendors on features and improvements to help drive the direction of Skype-related products. Michael is also the host and webmaster for www.VideoCallTips.com, a Web site focused on helping people understand how to make video calls to family and friends, and maintains ratings of the many video call solutions available. Michael’s full-time employment is as a computer security consultant with 18 years’ experience in the computer technology field. Michael works for a Fortune 500 company, where he delivers security consulting services to its clients. Michael also presents for his company at many trade shows and conferences and works with associations and groups, advising agencies like the FBI on Skype security and the Center for Internet Security on wireless security. Tony Rosela (PMP, CTT +) is a Senior Member Technical Staff with Computer Sciences Corporation working in the development and delivery of technical instructional material. He provides leadership through knowledge and experience with the operational fundamentals of PSTN architecture and how the PSTN has evolved to deliver high-quality services, including VoIP His other specialties include IP enabling voice networks, WAN voice and data network design, implementation and troubleshooting as well as spending a great deal of time in the field of computer forensics and data analysis. Choon Shim is responsible for Qovia’s technology direction and development of the Qovia product line. Choon was previously President at Widearea Data Systems, where he designed and developed collaboration platform software. Prior to joining Widearea Data Systems, he was the Senior Development Manager and Principal Engineer for Merant. Choon is a successful technology leader with 20 + years’ experience architecting, building, and delivering large-scale infrastructure software products. He has extensive hands-on technical development skills and has successfully managed software teams for well-known enterprise software companies, including BMC Software and EMC Corporation. Choon is the author of Community Works and Express/OS shareware used widely throughout the world. He is a frequent speaker at VoIP and networking conferences for academic and industry. He recently gave a keynote speech to an SNPD conference and chaired a VoIP Security Panel at Supercomm05. Choon holds a B.S. in Computer Science from Kyoungpook National University and an M.S in Electrical Engineering from the University of Wisconsin. Michael Sweeney (CCNA, CCDA, CCNP, MCSE, SCP) is the owner of the Network Security consulting firm Packetattack.com. Packetattack.com’s specialties are network design and troubleshooting, wireless network design, security, and analysis. The Packetattack team uses industry-standard tools such as Airmagnet, AiroPeekNX, and NAI Sniffer. Packetattack.com also provides digital forensic analysis services. Michael has been a contributing author for Syngress for the books Cisco Security Specialist’s Guide to PIX Firewalls (ISBN: 1-931836-63-9), Cisco Security Specialist’s Guide to Secure Intrusion Detection Systems (ISBN: 1-932266-69-0), and Building DMZs for Enterprise Networks (ISBN: 1-931836-88-4). Through PacketPress, Michael has also published Securing Your Network Using Linux (ISBN: 1-411621-77-8). Michael has recently joined the ranks of “Switchers” where he is now using two OS X Macs...



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.