CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • SAFE: IP Telephony Security in Depth


    The "SAFE: IP Telephony Security in Depth" white paper covers best-practice information for designing and implementing secure IP telephony networks. Like the other two SAFE "in Depth" white papers previously discussed, this white paper focuses on one technology and details how to best secure that technology within the overall context of SAFE. Similar to the SAFE Wireless white paper, "SAFE: IP Telephony Security in Depth" covers several deployment models for IP telephony, ranging from a large network deployment to a small network deployment.

    The base premise of the white paper is that the IP telephony deployment must provide secure, ubiquitous IP telephony services to the locations and users that require it, while maintaining as many of the characteristics of traditional telephony as possible. This white paper adds 10 more axioms to the overall list of SAFE axioms:

    • Voice networks are targets.

    • Data and voice segmentation is key.

    • Telephony devices don't support confidentiality.

    • IP phones provide access to the data-voice segments.

    • PC-based IP phones require open access.

    • PC-based IP phones are especially susceptible to attacks.

    • Controlling the voice-to-data segment interaction is key.

    • Establishing identity is key.

    • Rogue devices pose serious threats.

    • Secure and monitor all voice servers and segments.



  • / 290