Approach of formation of requirements for IP-telephony information security from threats of average «hacker»
Download article in PDF format
Authors: Makarova O. S.
Annotation: Approach of formation of requirements for corporate IP-telephony information security is offered. Results of using this approach for one type of attacker – average «hacker» are considered. The approach to differentiate requirements depending on change of value of assets of the organization is defined.
Keywords: ip-telephony, requirements for ip-telephony information security, average «hacker»