Featuring 5 Papers as of May 5, 2005
The GSM Standard (An overview of its security)
Suraj Srinivas - October 31, 2003
This paper examines the security issues of the Global Systgem for Mobile Communications (GSM), a mobile phone system used throughout the world.
Eavesdropping an IP Telephony Call
Tom Long - October 31, 2003
This paper examines the area of call eavesdropping in detail and outlines how the process of eavesdropping has changed as the PBX technology has evolved; it also suggests that the art of call eavesdropping may be easier than ever before.
Security Analysis: Traditional Telephony and IP Telephony
Alan Klein - October 31, 2003
The goal of this paper is to take a step back and analyze the security implications of migrating from a traditional telephony architecture to an IP telephony architecture.
Often Overlooked: PBX and Voice Security in a Networked World
Chris Herrera - October 31, 2003
My goal is to bring you up to speed on some of the common risks and specific attacks/countermeasures associated with voice systems.
Unified Communications Technologies
Jason Kelly - October 31, 2003
This paper will cover the basics of unified Communications, what it is, how it works and how it is vulnerable to attack.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.