Featuring 9 Papers as of December 29, 2008
Security Considerations for Avaya ESS Implementation
Thomas McDermott - December 29, 2008
This paper addresses the security requirements of an enterprise PBX. The sample PBX architecture is an Avaya Enterprise Survivable Server (ESS) environment supporting an enterprise with multiple call centers.
Skype: A Practical Security Analysis
Bert Hayes - October 15, 2008
The purpose of this paper is to suggest best practices and recommendations when running Skype.
VoIP Security Vulnerabilities
David Persky - December 21, 2007
Since the dawn of time, humans have tried to communicate with each other. As languages and dialects prospered, the forms of communication became more advanced by using letters in various alphabets and writing messages on papers or letters. From the Caeser cipher that Julius Caesar used where letters in encrypted messages were actually three letters off, to the Nazis in WWII who built and used the Enigma machine to encrypt military communications, to SIP-TLS to encrypt VoIP conversations, as forms of communication have advanced there have been subsequent efforts to keep those communications secret by one party, and to identify the clear message by a second party.
Security Issues and Countermeasure for VoIP
Jianqiang Xin - February 7, 2007
This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem.
Voice Over Internet Protocol (VoIP) and Security
Greg Tucker - January 17, 2005
This paper will describe Voice Over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. Business concerns of implementing VoIP, components of a VoIP system, and relevant security issues and concerns as they apply to the topics, are explored.
The VoIP Dilemma
Fernando Robles - August 15, 2004
This paper intends to discuss the general security concerns that need to be considered during the design and implementations of a VoIP (Voice over Internet Protocol) converged infrastructure.
Latency and QoS for Voice over IP
Karie Gonia - March 20, 2004
This paper will familiarize the reader with the fundamentals of a VoIP (Voice over IP) implementation and its effects. VoIP has been a front runner for companies looking to take advantage of IP.
Secure Voice Over IP
Brian Stringfellow - October 31, 2003
The purpose of this document is to give a general overview of Voice over IP (VoIP) and to explain the essential security issues surrounding a successful VoIP deployment.
Security Concerns with VOIP
Eric Weiss - October 31, 2003
This paper will briefly discuss the following IP telephony standards: H.323 from the ITU, Session Initiation Protocol (SIP) from the IETF,and MGCP by the Media Control Working Group.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.