Voice Over IP Security Issues

01 January 2005

New Image

An important theme of this chapter is the segmentation of network traffic into logical groups to minimize the risk of eavesdropping, traffic insertion, and manipulation. In addition, no single recommendation in this chapter will provide sufficient security to adequately protect a VoIP infrastructure. It is a thorough defense in depth, layered protection model, which protects a network and limits any exposure or compromise.