This document summarizes a presentation on security challenges and defenses in VOIP infrastructure. It begins by defining VOIP and how it works, processing voice data over IP networks using protocols like SIP, RTP, and UDP. It then outlines common security concerns like denial of service attacks, eavesdropping, message tampering, toll fraud, and account manipulation. Specific attack vectors are described at the signaling and media layers, such as SIP hijacking, message modification, and RTP tampering. Defenses including separating voice and data traffic, configuration authentication, signaling authentication using IPsec, and media encryption using SRTP are proposed to secure the VOIP system from these attacks.