Approach of formation of requirements for IP-telephony information security from threats of average «hacker»

Download article in PDF format

Authors: Makarova O. S.

Annotation: Approach of formation of requirements for corporate IP-telephony information security is offered. Results of using this approach for one type of attacker – average «hacker» are considered. The approach to differentiate requirements depending on change of value of assets of the organization is defined.

Keywords: ip-telephony, requirements for ip-telephony information security, average «hacker»

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates