Sorry! The requested paper could not be found.
Featuring 5 Papers as of May 5, 2005
Security Analysis: Traditional Telephony and IP Telephony
by Alan Klein - March 29, 2003
The goal of this paper is to take a step back and analyze the security implications of migrating from a traditional telephony architecture to an IP telephony architecture.
Unified Communications Technologies
by Jason Kelly - January 29, 2003
This paper will cover the basics of unified Communications, what it is, how it works and how it is vulnerable to attack.
Often Overlooked: PBX and Voice Security in a Networked World
by Chris Herrera - January 12, 2003
My goal is to bring you up to speed on some of the common risks and specific attacks/countermeasures associated with voice systems.
Eavesdropping an IP Telephony Call
by Tom Long - October 4, 2002
This paper examines the area of call eavesdropping in detail and outlines how the process of eavesdropping has changed as the PBX technology has evolved; it also suggests that the art of call eavesdropping may be easier than ever before.
The GSM Standard (An overview of its security)
by Suraj Srinivas - December 20, 2001
This paper examines the security issues of the Global Systgem for Mobile Communications (GSM), a mobile phone system used throughout the world.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.