1 - 6 of 6 Chapters
[In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s Critical Infrastructure. As we will see the telecom fraud and abuse scene involving PBXs are quite active, with many players targeting the...
[In this introductory chapter, we will briefly describe and group as many as possible of the threats in confidentiality, integrity, and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better...
[In this technical chapter we will present a block diagram of a PBX and also describe its parts and how each one can affect its security. Before getting to the PBX itself, we will examine the connection to the public network and to other PBXs. We will also see the cabling and distribution frames...
[While data communications have long before begun to utilize every possible means of protection, enjoying a vivid research and development sector, PBX arena has not caught up. Following the taxonomy of threats and the technical analysis of the previous chapters, in this chapter we will further...
[Given the increased criminal activity targeting PBXs, it is essential to have an idea about the modus operandi of attackers as well as to be able to understand the forensics procedures involved when analyzing an incident. Specifically for PBXs, there exist many commands and tools that can help...
[In this book we tried to raise users’ and administrators’ awareness in regard to security and privacy threats targeting PBXs. The presentation of vulnerabilities and the way malicious users take advantage of them was focused on practical issues, skipping theoretical analysis of algorithms and...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.