Protect your UC services against eavesdropping and security attacks

With the right access, anyone can observe or adjust your unified communications services. Learn how to ward off unauthorized modification and eavesdropping attacks in this chapter from Seven Deadliest Unified Communications Attacks.

The cover of the book Seven Deadliest Unified Communications Attacks by Dan York, published by Syngress. This chapter provides step-by-step instruction on how to safeguard your unified communications services from dangerous modification and eavesdropping attacks.

It's unsettling, but it's a fact: The bedrock elements of unified communications (UC) services -- voice, video and instant messaging (IM) -- can be observed and modified by individuals that can gain unauthorized access to your core IP network. At minimum, unauthorized access opens the door to data leakage. In the wrong hands, however, an informed attacker could compromise network security via unified communications applications, access proprietary information, modify network settings and launch malware or eavesdropping attacks, jeopardizing an enterprise on many levels.

There are steps you can take to secure your UC services. The book Seven Deadliest Unified Communications Attacks provides useful insight to secure your UC applications.

In this chapter from Seven Deadliest Unified Communications Attacks, author Dan York illustrates how to safeguard voice, video and instant messages (IM) from unauthorized modification and eavesdropping attacks by explaining the goals, design and building blocks behind these intrusions. Find out why attacking unified communications services is so dangerous to enterprise security, how these attacks could potentially evolve and more.

Download the PDF of "Eavesdropping and Modification" from the book Seven Deadliest Unified Communications Attacks here.

Reproduced from the book Seven Deadliest Unified Communications Attacks by Dan York (ISBN-10: 1597495476; ISBN-13: 978-1597495479). Copyright 2010, Syngress. All rights reserved. For more information about this and other similar titles, visit Syngress.


About the book:

In Seven Deadliest Unified Communications Attacks, author Dan York helps you keep up with the latest hacks, attacks and methods of exploiting unified communications services and technology, detailing the most dangerous assaults and laying out how to properly secure your system to defend against them. Through in-depth exploration of the potential pitfalls and step-by-step instructions on how to avoid them, you'll learn all the techniques you need to protect your computer, network and valuable UC services.

Read Seven Deadliest Unified Communications Attacks to learn more about securing your unified communications services against:

 

This was first published in March 2010

Dig deeper on Unified Communications Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchMobileComputing

SearchNetworking

SearchTelecom

SearchITChannel

SearchEnterpriseWAN

SearchExchange

Close