VoIP and PBX Security and Forensics A Practical Approach
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background
- PDF / 5,231,661 Bytes
- 112 Pages / 439.43 x 666.14 pts Page_size
- 58 Downloads / 274 Views
Iosif I. Androulidakis
VoIP and PBX Security and Forensics A Practical Approach Second Edition
123
SpringerBriefs in Electrical and Computer Engineering
More information about this series at http://www.springer.com/series/10059
Iosif I. Androulidakis
VoIP and PBX Security and Forensics A Practical Approach Second Edition
Iosif I. Androulidakis Pedini Ioannina Greece
ISSN 2191-8112 ISSN 2191-8120 (electronic) SpringerBriefs in Electrical and Computer Engineering ISBN 978-3-319-29720-0 ISBN 978-3-319-29721-7 (eBook) DOI 10.1007/978-3-319-29721-7 Library of Congress Control Number: 2016934056 © Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland
To my parents
Preface
Apart from the public telephone network we all know, there is a parallel private network, consisting of private branch exchanges (PBXs). These are privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Modern societies rely on telecommunication infrastructure more than ever. PBXs serve Hospitals, Ministries, Police, Army, Banks, Public bodies/authorities, Companies, Industries, and so on. This leads to the assumption that most—if not all—of the nations’ vital infrastructures rely on PBXs as well. As such, it is not an exaggeration to state that PBXs are part of a nation’s critical infrastructure. The purpose of this second edition of the book, therefore, is to raise user awareness in regard to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. Morover, this second edition has an extended coverage on VoIP systems. It is focused on practical issues and easy-to-follow examples, skipping theore
Data Loading...