In this tip you will discover an extensive list of sites that track and document attack tools that attempt packet flooding and signal manipulation. This is the third tip in a series of three by Gary Audin that give you free tools to deal with everything from sniffing and manipulating the packet stream, and IP Telephony fuzzing. These three tips cover many of the forms of attacks and malicious behavior that have so far been created. There are also scanning, enumeration and miscellaneous tools as well as commercial development tools that are available. As VoIP becomes more pervasive and the number of individuals using VoIP increases, so will the attack tools. Keep checking the sites mentioned in these tips for further additions to the attack tools list.
VoIP security -- problems inherited from data networking
VoIP security problems present a challenge for voice and network staff because IP telephony brings with it not only the security problems of data networks but also new, added threats specific to VoIP. In this tip, learn about the data network security threats that your voice staff must confront, how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel.
VoIP/IP Telephony vendor security solutions
VoIP and IP Telephony system vendors have been improving their security offerings, but are they good enough for your VoIP implementation? Learn about the various security solutions you can implement in your VoIP network to help protect you against attacks and security issues with this tip from Gary Audin. Audin cites an article from the January 2006 issue of Business Communications Review in which the authors conducted a series of security tests on different VoIP vendors' product offerings, and then scored them on performance. See how your own network measures up!