VOIP SECURITY
First Claim
Patent Images
1. A method for securing a VoIP system comprising:
- auditing a network containing a plurality of assets to identify one or more of the plurality of assets associated with a VoIP system; and
identifying one or more vulnerabilities associated with the one or more of the plurality of assets.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are techniques for protecting VoIP networks by defending against malicious traffic and malicious access to the systems and networks used for the transmission, storage and management of VoIP data, including defense against weaknesses inherent in VoIP, Local Area Network (LAN), Wide Area Network (WAN) and Internet networks used to carry VoIP traffic.
82 Citations
21 Claims
-
1. A method for securing a VoIP system comprising:
-
auditing a network containing a plurality of assets to identify one or more of the plurality of assets associated with a VoIP system; and
identifying one or more vulnerabilities associated with the one or more of the plurality of assets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for securing a VoIP system comprising:
-
auditing a network to identify a plurality of network assets;
identifying one or more vulnerabilities associated with a VoIP resource intended for use with the network; and
reconfiguring the network to secure the network against the one or more vulnerabilities. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method of securing a VoIP system comprising:
-
auditing a network to identify one or more assets associated with a VoIP system;
monitoring the one or more assets of the VoIP system to identify VoIP traffic; and
analyzing the VoIP traffic for the presence of a security threat. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification