NETWORK WORLD NEWSLETTER: M. E. KABAY ON SECURITY
07/14/05
Today's focus: VoIP books and white papers
Dear security.world@gmail.com,
In this issue:
* VoIP security resources
* Links related to Security
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Increase efficiency through enhanced mobility!
On-demand access - whenever and wherever. Mobilize in a way that
is secure, reliable and manageable. Learn how to implement a
secure enterprise mobility strategy. Get access to white
papers, case studies, webcast and more!
http://www.fattail.com/redir/redirect.asp?CID=107508
_______________________________________________________________
Experience Innovation at DEMOfall
Join the industry's most influential leaders September 19-21 at
the Hyatt Huntington Beach for DEMOfall 2005 - two days of
dynamic presentations showcasing the latest and most exciting
innovations in the world of technology. Get a first look at all
the hottest trends, and network with powerful journalists,
analysts, and VCs. Register now!
http://www.fattail.com/redir/redirect.asp?CID=107882
_______________________________________________________________
Today's focus: VoIP books and white papers
By M. E. Kabay
In my last column, I introduced a major document reviewing VoIP
security published by the National Institute of Standards and
Technology. In this column, I am presenting additional resources
for those of you interested in deepening your knowledge of VoIP
or in finding resources for teaching others about VoIP security.
Textbooks
* In _Voice over IP Fundamentals_ Jonathan Davidson, James
Peters and Brian Gracely provide an overview of VoIP in a single
short text dating back a few years.
<http://www.amazon.com/exec/obidos/ASIN/1578701686/fusion0e/>
Similar overviews:
* Scott Keagy's _Integrating Voice and Data Networks: Practical
solutions for the world of packetized voice over data networks_
<http://www.amazon.com/exec/obidos/ASIN/1578701961/fusion0e/>
* Mark A. Miller's _Voice over IP Technologies: Building the
Converged Network_
<http://www.amazon.com/exec/obidos/ASIN/0764549073/fusion0e/>
* Gonzalo Camarillo's _SIP Demystified_ is a short text about
Session Initiation Protocol (SIP), one of the major techniques
used in VoIP. Chapters 4 (fundamentals of the protocol), 5
(examples of how SIP works), and 6 (security) are the core of
the book.
<http://www.amazon.com/exec/obidos/ASIN/0071373403/fusion0e/>
White Papers
* "Vulnerabilities and Security Limitations of current IP
Telephony Systems" is a 2001 paper by Ralf Ackermann, Markus
Schumacher, Utz Roedig and Ralf Steinmetz that discussed "the
theoretical background of certain vulnerabilities, testing and
attacking tools" and found significant vulnerabilities in many
VoIP technologies.
<http://tinyurl.com/8pxya>
* A white paper by Jason Halpern of Cisco discusses security of
VoIP in the context of Cisco's SAFE framework. The author
begins, "This paper provides best-practice information to
interested parties for designing and implementing secure IP
telephony networks utilizing elements of the SAFE blueprints.
All SAFE white papers are available at the SAFE Web site:
<http://www.cisco.com/go/safe> These documents were written to
provide best-practice information on network security and VPN
designs."
<http://tinyurl.com/dtf2h>
* Another Cisco white paper extends this framework to what the
company calls "Integrated Network Security for Cisco IP
Communications" and which "will provide comprehensive security
with system-level protection, integrity, and privacy through
tighter integration with the security capabilities of the data
network."
<http://tinyurl.com/cwgqm>
* A 10-page white paper from Vitel Software offers some
practical advice on protocols, hardware, and monitoring as
useful tools in securing VoIP.
<http://tinyurl.com/dgf9n>
* Tom Long and Brian Boyter wrote very nice descriptions of
sniffing attacks on VoIP and several countermeasures as part of
their work for the GIAC Security Essentials Certification (GSEC)
and GIAC Certified Incident Handler (GCIH) certification,
respectively.
Long's "Eavesdropping an IP Telephony Call":
<http://tinyurl.com/86yo5>
Boyter's "Voice-over-IP Sniffing Attack":
<http://tinyurl.com/bm9bn>
* Mark Collier's "The Value of VoIP Security" has excellent
recommendations for securing VoIP which are worth quoting
directly here:
- Use some form of host-based intrusion detection to detect
attacks.
- Deploy a voice-optimized firewall to protect the IP PBX from
attackers on the LAN and Internet.
- Build a switched network. This not only improves performance,
but also makes it more difficult for an attacker to access end
points.
- Make use of VLANs to help segregate traffic.
- Secure all networking components, including switches, routers,
etc.
- For campus VoIP, configure Internet firewalls and other
security systems to prevent VoIP from entering or leaving the
internal network.
- Limit the number of calls traveling over the WAN to the media
gateway or any shared resource that could be overloaded by a DoS
attack.
- Consider additional firewalls and security products to control
or monitor traffic on the network.
<http://tinyurl.com/dbmak>
* Frank Echezabal wrote a nine-page paper for the GIAC Security
Essentials Certification (GSEC) on VoIP Security that provides a
succinct summary of the issues:
<http://tinyurl.com/dxo7w>
* Andrew Molitor of Aravox Technologies wrote a couple of short
white papers with helpful information about firewalls for VoIP
systems:
"Deploying a Dynamic Voice over IP Firewall with IP Telephony
Applications":
<http://tinyurl.com/8tp2c>
"Securing VoIP Networks with Specific Techniques, Comprehensive
Policies and VoIP-Capable Firewalls":
<http://tinyurl.com/86vr4>
In my next column, I will examine in more detail an excellent
exposition of threats to VoIP from an Austrian student's
master's thesis. For a sneak peek see:
<http://tinyurl.com/bfzez>
RELATED EDITORIAL LINKS
Users bank on managed security services
Network World, 07/11/05
http://www.networkworld.com/nlsec3280
All eyes on security management
Network World, 07/11/05
http://www.networkworld.com/news/2005/071105-sim.html?rl
_______________________________________________________________
To contact: M. E. Kabay
M. E. Kabay, Ph.D., CISSP, is Associate Professor in the
Division of Business and Management at Norwich University in
Northfield, Vt. Mich can be reached by e-mail
<mailto:mkabay@norwich.edu> and his Web site
<http://www2.norwich.edu/mkabay/index.htm>.
A Master's degree in the management of information assurance in
18 months of study online from a real university - see
<http://www.msia.norwich.edu/>
_______________________________________________________________
This newsletter is sponsored by Nokia
Increase efficiency through enhanced mobility!
On-demand access - whenever and wherever. Mobilize in a way that
is secure, reliable and manageable. Learn how to implement a
secure enterprise mobility strategy. Get access to white
papers, case studies, webcast and more!
http://www.fattail.com/redir/redirect.asp?CID=107507
_______________________________________________________________
ARCHIVE LINKS
Archive of the Security newsletter:
http://www.networkworld.com/newsletters/sec/index.html
Security Research Center:
http://www.networkworld.com/topics/security.html
Instant sign-up for Security News Alert:
http://www.networkworld.com/isusecna
Instant sign-up for Virus & Bug Patch Alert:
http://www.networkworld.com/isubug
_______________________________________________________________
FEATURED READER RESOURCE
THE ROI OF VOIP
When it comes to VoIP, most network managers are satisfied that
the technology works. But there are questions: What will the new
technology cost to roll out and support, and what benefits can
companies expect to reap? Check out NW's step-by-step guide on
how to determine the true cost and benefits of VoIP. Click here:
<http://www.networkworld.com/research/2005/071105-voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment