메뉴 건너뛰기




Volumn 17, Issue 1, 2007, Pages 61-87

Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples

Author keywords

Auditing; Communication technologies; Internet; Tests and testing

Indexed keywords


EID: 33846706416     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/10662240710730506     Document Type: Article
Times cited : (2)

References (20)
  • 2
    • 33846663248 scopus 로고    scopus 로고
    • available at: www.cse.wustl.edu/ ∼ jain/cis788-99/ftp/voipprotocols/ index.html (accessed 3 June 2005)
    • Arora, R. (2004), Voice over IP: Protocol and Standards: RTP and RTCP available at: www.cse.wustl.edu/ ∼ jain/cis788-99/ftp/voipprotocols/index. html (accessed 3 June 2005).
    • (2004) Voice over IP: Protocol and Standards: RTP and RTCP
    • Arora, R.1
  • 3
    • 33846668743 scopus 로고    scopus 로고
    • Penetration testing and social engineering hacking
    • Elsevier Ltd, Barking
    • Barrett, N. (2003), "Penetration testing and social engineering hacking", Information Security Technical Report, Vol. 8 No. 4, p. 57, Elsevier Ltd, Barking.
    • (2003) Information Security Technical Report , vol.8 , Issue.4 , pp. 57
    • Barrett, N.1
  • 5
    • 84926176365 scopus 로고    scopus 로고
    • available at: www.deloitte.com/dtt/research/0,1015, sid%253D1012%2526cid%253D64018,00.html (accessed 6 June 2005)253D64018,00.html (accessed 6 June 2005)
    • Deloitte Research (2004), Getting of the Ground: VoIP Goes Mainstream, available at: www.deloitte.com/dtt/research/0,1015, sid%253D1012%2526cid%253D64018,00.html (accessed 6 June 2005)253D64018,00.html (accessed 6 June 2005).
    • (2004) Getting of the Ground: VoIP Goes Mainstream
    • Research, D.1
  • 6
    • 33846687674 scopus 로고    scopus 로고
    • available at: www.hackingexposedvoip.com/index.php (accessed 29 August 2006)
    • Endler, D. and Collier, M. (2006), Hacking VoIP Exposed, Black Hat Briefing, available at: www.hackingexposedvoip.com/index.php (accessed 29 August 2006).
    • (2006) Hacking VoIP Exposed, Black Hat Briefing
    • Endler, D.1    Collier, M.2
  • 8
    • 33846674863 scopus 로고    scopus 로고
    • (The) Institute for Security and Open Methodologies (ISECOM) (n.d.)
    • (The) Institute for Security and Open Methodologies (ISECOM) (n.d.) available at: www.isecom.org.
  • 10
    • 33846692489 scopus 로고    scopus 로고
    • available at: www.jaynta.com/technology/principlesofspeechcoding.pdf (accessed 2 June 2005)
    • McElroy, C. (2003), Principles of Speech Coding, available at: www.jaynta.com/technology/principlesofspeechcoding.pdf (accessed 2 June 2005).
    • (2003) Principles of Speech Coding
    • McElroy, C.1
  • 12
    • 84870723113 scopus 로고    scopus 로고
    • available at: www.dhs.gov/interweb/assetlibrary/NIACCVSSFinalRpt12-2-04. pdf (accessed 11 July 2005)
    • US National Infrastructure Advisory Council (2004), Common Vulnerability Scoring System, available at: www.dhs.gov/interweb/assetlibrary/ NIACCVSSFinalRpt12-2-04.pdf (accessed 11 July 2005).
    • (2004) Common Vulnerability Scoring System
  • 13
    • 33846670215 scopus 로고    scopus 로고
    • US National Security Agency (NSA) Security Configuration Guides (n.d.)
    • US National Security Agency (NSA) Security Configuration Guides (n.d.), available at: www.nsa.gov/snac/.
  • 14
    • 33846704071 scopus 로고    scopus 로고
    • (online), available at: http://nvd.nist.gov/ (accessed between 23 August and 9 September 2005)
    • US National Vulnerability Database (2005), (online), available at: http://nvd.nist.gov/ (accessed between 23 August and 9 September 2005).
    • (2005)
    • National Vulnerability Database, U.S.1
  • 15
    • 33846659375 scopus 로고    scopus 로고
    • available at: www.vopsecurity.org/html/tools.html (accessed 22 July 2005)
    • Voice over Packet Security Forum (2005), SiVus - The VoIP Vulnerability Scanner, available at: www.vopsecurity.org/html/tools.html (accessed 22 July 2005).
    • (2005) SiVus - The VoIP Vulnerability Scanner
  • 18
    • 84926191225 scopus 로고    scopus 로고
    • available at: www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safipwp.pdf
    • Cisco Systems (2003), Safe Blueprint: IP Telephony Security in Depth, available at: www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safipwp.pdf.
    • (2003) Safe Blueprint: IP Telephony Security in Depth
    • Systems, C.1
  • 19
    • 0003187764 scopus 로고
    • Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
    • European Parliament and the Council (1995), "Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data", Journal of the European Communities, Vol. L No. 281, p. 31.
    • (1995) Journal of the European Communities , vol.50 , Issue.281 , pp. 31
    • Parliament, E.1    Council, T.2
  • 20
    • 84856879037 scopus 로고
    • (online), available at: www.opsi.gov.uk/acts/acts1998/19980029.htm
    • Great Britain Parliament (1988), The Data Protection Act 1988, (online), available at: www.opsi.gov.uk/acts/acts1998/19980029.htm.
    • (1988) The Data Protection Act 1988
    • Britain Parliament, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.