19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

276<br />

Part V: Hacking Applications<br />

Countermeasures against VoIP<br />

vulnerabilities<br />

Locking down VoIP can be tricky. You can get off to a good start, though, by<br />

segmenting your voice network into its own VLAN — or even a dedicated<br />

physical network if that fits into your budget. You should also make sure that<br />

all VoIP-related systems are hardened according to vendor recommendations<br />

and widely accepted best practices (such as NIST’s SP800-58 document at<br />

http://csrc.nist.gov/publications/nistpubs/800-58/SP800-<br />

58-final.pdf) and that software and firmware are fully patched.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!