[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] scalability cost savings of VoIP network expansion growth management 2nd planning for future growth 2nd Schneier, Bruce SCP (Session Control Point) script kiddies security detecting breaches 2nd events forensics hackers versus physical intruders 2nd 3rd 4th intrusion detection intrusions prevention 2nd reacting to intrusions 2nd recommended practices securing central facilities 2nd 3rd 4th 5th 6th 7th vulnerabilities of VoIP annoyances 2nd call hijacking confidentiality 2nd 3rd 4th 5th data network 2nd 3rd 4th 5th DoS attacks 2nd IP phones 2nd 3rd packets 2nd toll fraud 2nd undefined processes 2nd 3rd 4th selecting metrics for SLAs 2nd availability 2nd call quality 2nd call setup performance 2nd selecting codecs 2nd 3rd selecting integrators criteria 2nd 3rd 4th selecting MSPs criteria 2nd 3rd self service MSPs self-healing networks Sequence Number field (RTP header) servers gatekeepers hardening 2nd 3rd 4th security vulnerabilities 2nd sharing drives sharing network resources overprovisioning 2nd oversubscribing 2nd performance requirements shunning signaling signatures silence suppression single network infrastructure savings in VoIP deployment 2nd 3rd SIP (Session Initiation Protocol) SIV (system integrity verifier) SLA SLAs cancelling contracts implementing 2nd defining responsibilities enforcement procedures 2nd measurement tools 2nd negotiations 2nd 3rd 4th 5th selecting relevant metrics 2nd 3rd incident tracking managing 2nd selecting metrics 2nd availability 2nd call quality 2nd call setup performance 2nd SLAs (service-level agreement) ensuring reliability of VoIP deployment soft benefits softphones 2nd security vulnerabilities Source Address field (IP packet header) Source ID field (RTP header) SS7 (Signaling System 7) stages of telephone call standards data-networking G.711 stateful inspection STP (Signal Transfer Point) subjective call quality measurements switches 2nd 3rd Class 5 tandem |