||Recover from Voice over IP (VoIP) Device Masquerades or Voice over IP (VoIP) Server Compromise: If a VoIP masquerading event is occuring the service provider or network operator should attempt to collect data via log files or other means to aid law enforcement investigations If VoIP device masquerading is causing significant harm, the portion of the network where the attack is originating can be isolated.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Service Provider; Network Operator
||Cyber Security;Disaster Recovery;Emergency Preparedness;Intrusion Detection;
||PacketCable Security specification.