SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhen implemented within an overall security mindset, IP Telephony can successfully address key business problems. It has the potential to dramatically increase the competitive effectiveness of a company and increase shareholder value. Because of the technologies and skill sets involved, IP telephony transcends the traditional job boundaries of data communications and telecommunications. The goal of this paper is to take a step back and analyze the security implications of migrating from a traditional telephony architecture to an IP telephony architecture. The key components of the two architectures, the phones/stations and the PBX/Gatekeeper/Gateway, are analyzed for vulnerabilities snooping/eavesdropping, theft of service, and denial of service..