Top 14 VoIP vulnerabilities

02 October 2007

The top VoIP vulnerabilities explained

How are VoIP networks weak and vulnerable to attack and catastrophic failure? Securing VoIP Networks,
the new book by Peter Thermos and Ari Takanen, looks at VoIP
infrastructure and analyses its vulnerabilities much as the Open Web
Application Security Project did for Web-related vulnerabilities and
Mitre did with its Common Weakness Enumeration dictionary for software. And it's about human failings, too, not just technology problems.

Here are the top VoIP vulnerabilities explained in Securing VoIP Networks:

Ready for a Free Quote?

Click below to get a free quote and start saving money on VoIP today.

Get Started