Secure Communication Channels
In the previous chapter, you looked at network architecture and how network protocols communicate, but if you are tasked with securing a network, you also need to know the risks that they introduce and how to mitigate them. This section focuses on some of the critical design aspects of building secure communication channels such as voice, multimedia collaboration, remote access, and virtualizing networks. You will look at remote access connectivity and the security ramifications of multimedia collaboration and third-party connectivity.
Voice
The most important concerns with regard to securing voice communications over a network are confidentiality and availability. As with traditional voice calls, the chief threat to the confidentiality of voice over IP (VoIP) calls is eavesdropping. While traditional voice communication requires access to the cable that carries the voice signal, VoIP only requires the ability to intercept the traffic that passes...