VoIP and PBX Security and Forensics: Introduction
Androulidakis, Iosif I.
2016-04-26 00:00:00
[In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/voip-and-pbx-security-and-forensics-introduction-of5V50JvDN
[In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.]
Published: Apr 26, 2016
Keywords: PBX; PBX features; PBX statistics; PBX as critical infrastructure; Telecommunications fraud; PBX vs VoIP
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.