First page Back Continue Last page Graphics
Notes on Mitigation
Often there are no clear-cut “solutions” to any vulnerability or attack
I will refrain from using the “isolate your VoIP network” cop-out “solution”
Some mitigation techniques suggested do work; In part three, I’ll only be discussing:
- Those that don’t work well
- Those that have significant drawbacks
- Those that have significant barriers to implementation