It's unsettling, but it's a fact: The bedrock elements of unified communications (UC) services -- voice, video and instant messaging (IM) -- can be observed and modified by individuals that can gain unauthorized access to your core IP network. At minimum, unauthorized access opens the door to data leakage. In the wrong hands, however, an informed attacker could compromise network security via unified communications applications, access proprietary information, modify network settings and launch malware or eavesdropping attacks, jeopardizing an enterprise on many levels.
There are steps you can take to secure your UC services. The book Seven Deadliest Unified Communications Attacks provides useful insight to secure your UC applications.
In this chapter from Seven Deadliest Unified Communications Attacks, author Dan York illustrates how to safeguard voice, video and instant messages (IM) from unauthorized modification and eavesdropping attacks by explaining the goals, design and building blocks behind these intrusions. Find out why attacking unified communications services is so dangerous to enterprise security, how these attacks could potentially evolve and more.
Download the PDF of "Eavesdropping and Modification" from the book Seven Deadliest Unified Communications Attacks here.
Reproduced from the book Seven Deadliest Unified Communications Attacks by Dan York (ISBN-10: 1597495476; ISBN-13: 978-1597495479). Copyright 2010, Syngress. All rights reserved. For more information about this and other similar titles, visit Syngress.
About the book:
In Seven Deadliest Unified Communications Attacks, author Dan York helps you keep up with the latest hacks, attacks and methods of exploiting unified communications services and technology, detailing the most dangerous assaults and laying out how to properly secure your system to defend against them. Through in-depth exploration of the potential pitfalls and step-by-step instructions on how to avoid them, you'll learn all the techniques you need to protect your computer, network and valuable UC services.
Read Seven Deadliest Unified Communications Attacks to learn more about securing your unified communications services against:
- Unified communications ecosystem attacks;
- Insecure endpoints;
- Modification and eavesdropping attacks;
- Control channel attacks, including fuzzing, Denial of Service (DoS), SPIT and toll fraud;
- SIP trunking and PSTN interconnection;
- Identity, spoofing and vishing; and
- Attacks against distributed systems.
This was first published in March 2010