Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

VoIP and PBX Security and ForensicsPBX Forensics

VoIP and PBX Security and Forensics: PBX Forensics [Given the increased criminal activity targeting PBXs, it is essential to have an idea about the modus operandi of attackers as well as to be able to understand the forensics procedures involved when analyzing an incident. Specifically for PBXs there exist many commands and tools that can help in the evidence extraction. In this chapter we will analyze the subject of digital evidence from PBXs from both the theoretical and the technical side.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/voip-and-pbx-security-and-forensics-pbx-forensics-kffpEtl0v8
Publisher
Springer International Publishing
Copyright
© Springer International Publishing Switzerland 2016
ISBN
978-3-319-29720-0
Pages
75 –99
DOI
10.1007/978-3-319-29721-7_5
Publisher site
See Chapter on Publisher Site

Abstract

[Given the increased criminal activity targeting PBXs, it is essential to have an idea about the modus operandi of attackers as well as to be able to understand the forensics procedures involved when analyzing an incident. Specifically for PBXs there exist many commands and tools that can help in the evidence extraction. In this chapter we will analyze the subject of digital evidence from PBXs from both the theoretical and the technical side.]

Published: Apr 26, 2016

Keywords: PBX forensics; PBX crime; PBX fraud warning signs; PBX hackers’ modus operandi; PBX logs; Trunks data; Signaling data; Extensions’ data

There are no references for this article.