02 October 2007
The top VoIP vulnerabilities explained
How are VoIP networks weak and vulnerable to attack and catastrophic failure? Securing VoIP Networks,
the new book by Peter Thermos and Ari Takanen, looks at VoIP
infrastructure and analyses its vulnerabilities much as the Open Web
Application Security Project did for Web-related vulnerabilities and
Mitre did with its Common Weakness Enumeration dictionary for software. And it's about human failings, too, not just technology problems.
Here are the top VoIP vulnerabilities explained in Securing VoIP Networks: