. "P\u0159\u00EDsp\u011Bvek se zab\u00FDv\u00E1 problematikou internetov\u00E9 telefonie. Jsou zde pops\u00E1ny mo\u017En\u00E9 \u00FAtoky na VoIP architekturu a specifikov\u00E1ny z\u00E1kladn\u00ED po\u017Eadavky pro bezpe\u010Dn\u00FD a spolehliv\u00FD provoz. V p\u0159\u00EDsp\u011Bvku jsou pops\u00E1ny bezpe\u010Dnostn\u00ED mechanismy z\u00E1kladn\u00ED prevence s c\u00EDlem zajistit spolehliv\u00FD p\u0159enos medi\u00E1ln\u00EDch dat tak, aby syst\u00E9my IP telefonie, a s nimi spojen\u00E9 datov\u00E9 s\u00EDt\u011B, byly maxim\u00E1ln\u011B chr\u00E1n\u011Bny proti mo\u017En\u00FDm \u00FAtok\u016Fm. Jsou zde tak\u00E9 pops\u00E1ny nejv\u011Bt\u0161\u00ED hrozby, s uveden\u00EDm mo\u017En\u00FDch \u00FAtok\u016F, kter\u00E9 pat\u0159\u00ED k v sou\u010Dasn\u00E9 dob\u011B k nej\u010Dast\u011Bj\u0161\u00EDm, kter\u00E9 jsou definov\u00E1ny z pohledu jejich v\u00FDznamu, slabin a probl\u00E9mov\u00FDch m\u00EDst." . . "7"^^ . . "V" . "Univerzita Hradec Kr\u00E1lov\u00E9" . . "Praha, P\u0159\u00EDrodov\u011Bdeck\u00E1 fakulta UK Praha" . "GAUDEAMUS Hradec Kr\u00E1lov\u00E9" . . . "Rosman, Pavel" . . "Internet a nov\u00E9 technologie ve vzd\u011Bl\u00E1v\u00E1n\u00ED" . "RIV/70883521:28120/08:63507653" . . "Internet a nov\u00E9 technologie ve vzd\u011Bl\u00E1v\u00E1n\u00ED" . . "28120" . "Alternativn\u00ED metody v\u00FDuky 2008" . "Attacks; Threats; Communication; Internet Telefony; Security Voice over IP; VoIP; Vulnerability"@en . . "Internet and New Technologies in the Education"@en . . "P\u0159\u00EDsp\u011Bvek se zab\u00FDv\u00E1 problematikou internetov\u00E9 telefonie. Jsou zde pops\u00E1ny mo\u017En\u00E9 \u00FAtoky na VoIP architekturu a specifikov\u00E1ny z\u00E1kladn\u00ED po\u017Eadavky pro bezpe\u010Dn\u00FD a spolehliv\u00FD provoz. V p\u0159\u00EDsp\u011Bvku jsou pops\u00E1ny bezpe\u010Dnostn\u00ED mechanismy z\u00E1kladn\u00ED prevence s c\u00EDlem zajistit spolehliv\u00FD p\u0159enos medi\u00E1ln\u00EDch dat tak, aby syst\u00E9my IP telefonie, a s nimi spojen\u00E9 datov\u00E9 s\u00EDt\u011B, byly maxim\u00E1ln\u011B chr\u00E1n\u011Bny proti mo\u017En\u00FDm \u00FAtok\u016Fm. Jsou zde tak\u00E9 pops\u00E1ny nejv\u011Bt\u0161\u00ED hrozby, s uveden\u00EDm mo\u017En\u00FDch \u00FAtok\u016F, kter\u00E9 pat\u0159\u00ED k v sou\u010Dasn\u00E9 dob\u011B k nej\u010Dast\u011Bj\u0161\u00EDm, kter\u00E9 jsou definov\u00E1ny z pohledu jejich v\u00FDznamu, slabin a probl\u00E9mov\u00FDch m\u00EDst."@cs . . "[227E038B842F]" . "Internet a nov\u00E9 technologie ve vzd\u011Bl\u00E1v\u00E1n\u00ED"@cs . "1"^^ . "Internet a nov\u00E9 technologie ve vzd\u011Bl\u00E1v\u00E1n\u00ED"@cs . "2008-04-22+02:00"^^ . . "1"^^ . "Internet and New Technologies in the Education"@en . . . . . . "978-80-7041-454-5" . "372976" . "This paper deals with problems of Internet telephony. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signalling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specified basic requirements on safe and secure operation. This paper investigates the attacks and defences relevant to VOIP and explores ways to provide appropriate levels of security for VOIP networks at reasonable cost. The last part is concluded with a list of selected VoIP attacks, with implemented security mechanisms."@en . "RIV/70883521:28120/08:63507653!RIV09-MSM-28120___" . .