By Mark Collier and David Endler
Reviewed by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE, CMAS
Digital communications industry leaders warn of the convergence of hardware and software. But this convergence is the new normal that organizations implement to stay connected to their global partners. This new way of communicating helps companies face the challenge of creating a single new user experience that links service and technology support in a way that users prefer.
The threats to unified communications seek to compromise the availability of communications, steal bandwidth and services, steal information, listen in on private conversations, conduct espionage, impersonate users and manipulate specialized technical protocols to create instability in the service.
Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions develops an in-depth technical and practical analysis of the most important protocols in unified communications. This book helps information security professionals and IT auditors see the faults and information security risk that compromise the proper functioning of this technology. Hacking Exposed also explains how the transmission of information through Voice-over Internet Protocol (VoIP) works.
The 17 chapters of this book guide readers through the different aspects of VoIP including the recognition of unified communication networks, passing by the attacks on applications, and the handling of specialized protocols (e.g., Session Initiation Protocol [SIP] and Real-time Transport Protocol [RTP]). The book also has case studies that examine aspects of assurance and controls that limit such actions.
One of the most valuable parts of the book is the chapter on emerging technologies that sets the trends and realities of unified communications in the context of mobile computing and cloud computing. This approach opens up new possibilities and debates about rethinking the concepts of security and control.
This book is a reference for understanding the threats and risk associated with unified communications. It provides a way to identify specific practices to mitigate potential security breaches that can occur on the multiple VoIP platforms available internationally and implemented in many enterprises globally.
Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is available from the ISACA Bookstore. For information, visit the ISACA Bookstore online or email firstname.lastname@example.org.
Jeimy J. Cano, Ph.D., COBIT Foundation, CFE, CMAS, is a distinguished professor in the law department of the Universidad de los Andes, Bogota, Colombia. He has been a practitioner and researcher in information and computer security, digital evidence and computer forensics for more than 17 years in different industries. Cano is a member of the ISACA Publications Subcommittee.