tailieunhanh - Ebook Practical VoIP Security: Part 2

Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations. | Chapter 10 Validate Existing Security Infrastructure Solutions in this chapter Security Policies and Processes Physical Security Server Hardening Supporting Services Unified Network Management Summary Solutions Fast Track Frequently Asked Questions 263 264 Chapter 10 Validate Existing Security Infrastructure Introduction We begin the process of securing the VoIP infrastructure by reviewing and validating the existing security infrastructure. Addition of VoIP components to a preexisting data network is the ideal opportunity to review and bolster existing security policy architecture and processes. One way of visualizing the components of a given security architecture is to use Figure which graphically shows a number of network security interfaces. Figure Security Interfaces The interfaces between data and voice networks and the external world are rep- resented by the red circles numbered 1 through 6. Additionally data and voice net- works share interfaces with the physical and social realms. Interfaces to data and networks include VPNs telephones and modems modems that are used to control or monitor servers or other critical systems are particularly interesting to miscreants typical web browsing and e-mail services intracompany WAN connections and intranet or external connections with vendors and business secu- rity controls such as firewalls IDS and ACLs are useful at these interfaces. Interfaces 7 through 9 portray the users administrators and help desk personnel that connect with the data and voice networks. In some situations a call center for example an additional class of users operators could be defined. I believe based upon personal and anecdotal evidence that most criminal information security inci- dents occur via these social interfaces. Unfortunately technological security controls are difficult to implement and manage at these interfaces. Validate Existing Security Infrastructure Chapter 10 265 Interfaces 10 .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.