Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

VoIP and PBX Security and ForensicsIntroduction

VoIP and PBX Security and Forensics: Introduction [In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/voip-and-pbx-security-and-forensics-introduction-of5V50JvDN
Publisher
Springer International Publishing
Copyright
© Springer International Publishing Switzerland 2016
ISBN
978-3-319-29720-0
Pages
1 –8
DOI
10.1007/978-3-319-29721-7_1
Publisher site
See Chapter on Publisher Site

Abstract

[In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.]

Published: Apr 26, 2016

Keywords: PBX; PBX features; PBX statistics; PBX as critical infrastructure; Telecommunications fraud; PBX vs VoIP

There are no references for this article.