VOIPSA_Threat_Taxonomy_0.1

VOIPSA_Threat_Taxonomy_0.1 - 2005 VOIPSA, All Rights...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 2005 VOIPSA, All Rights Reserved page 1 of 36 VoIP Security and Privacy Threat Taxonomy Public Release 1.0 24 October 2005 2005 VOIPSA, All Rights Reserved page 2 of 36 Table of Contents Introduction....................................................................................................4 Active Contributors ........................................................................................5 1.0 Basic VoIP Terminology .....................................................................7 Basic VoIP Terminology - Continued..................................................8 Basic VoIP Terminology Continued .................................................9 Basic VoIP Terminology Continued ...............................................10 2.0 Relevant Protocols............................................................................10 Relevant Protocols Continued .......................................................11 Relevant Protocols Continued .......................................................12 3.0 Relevant Services.............................................................................13 4.0 Social Threats...................................................................................14 4.1 Introduction ...................................................................................14 4.2 Basic Multi-party Freedom Model ...........................................14 4.3 Privacy Model; Security as Dual of Privacy ............................15 4.4 Basic Social Responsibility Model ..........................................15 4.5 Misrepresentation..........................................................................16 4.5.1 Misrepresenting Identity..........................................................16 4.5.2 Misrepresenting Authority.......................................................17 4.5.3 Misrepresenting Rights...........................................................17 4.5.4 Misrepresenting Content.........................................................18 4.6 Theft of Services ...........................................................................18 4.7 Unwanted Contact.........................................................................18 4.7.1 Harrassment...........................................................................18 4.7.2 Extortion .................................................................................19 4.7.3 Unwanted Lawful Content Including VoIP SPAM and Other Subjectively Offensive Content.....................................19 5.0 Eavesdropping..................................................................................20 5.1 Call Pattern Tracking ........................................................................20 5.2 Traffic Capture..................................................................................20 5.3 Number Harvesting .......................................................................20 5.4 Conversation Reconstruction ........................................................20Conversation Reconstruction ....
View Full Document

This note was uploaded on 12/05/2009 for the course IT IS taught by Professor Arther during the Three '09 term at Queensland Tech.

Page1 / 36

VOIPSA_Threat_Taxonomy_0.1 - 2005 VOIPSA, All Rights...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online