![]() ![]() Presence information is also typically being shared. ![]() They all expand the surface area for potential attacks and expand the “zone of trust” you need to worry about when interacting with other external networks and systems.įederation between UC systems, in particular, is of concern regarding the control channel because in federation you are explicitly sharing control information and allowing remote systems, and conceivably remote endpoints to interact with your UC system. Īll of those trends apply equally to control channel attacks.Back in Chapter 3, “Eavesdropping and Modification” in the section “The Future of Eavesdropping and Modification Attacks,” you learned about the trends of ![]() Control channel attacks will continue to grow as UC systems continue to expand and interconnect. ![]()
0 Comments
Leave a Reply. |