Unified Communications Forensics book cover

Unified Communications Forensics

Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

• analysis of forensic artifacts in common UC attacks

• an in-depth look at established UC technologies and attack exploits

• hands-on understanding of UC attack vectors and associated countermeasures

• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

Audience

Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.

Paperback, 156 Pages

Published: October 2013

Imprint: Syngress

ISBN: 978-1-59749-992-7

Reviews

  • "Information security professionals Grant…and Shaw…describe the dangers that communication using Voice over Internet Protocol (VoIP) poses for companies, and how to prevent and detect attacks. Their topics include misconfiguration begat toll fraud and other VoIP mischief, mixed signals, session inauguration protocol attacks, hacking the network, and introduction to digital forensics."--Reference & Research Book News, December 2013


Contents

  • Chapter 1: A Brief Introduction

    Chapter 2: Spit, Phishing, and Other Social Outings

    Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief

    Chapter 4: Mixed Signals

    Chapter 5: Can You Hear Me Now

    Chapter 6: When SIP Attacks

    Chapter 7: Hacking the Network

    Chapter 8: VoIP Bots

    Chapter 9: Introduction to Digital Forensics

    Chapter 10: Security Best Practices - VoIP Implementation Policy

Advertisement

advert image