Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

VoIP and PBX Security and ForensicsPBX Security

VoIP and PBX Security and Forensics: PBX Security [While data communications have long before begun to utilize every possible means of protection, enjoying a vivid research and development sector, PBX arena has not caught up. Following the taxonomy of threats and the technical analysis of the previous chapters, in this chapter we will further provide some useful tips and advices for safeguarding PBXs. Due to the multitude of dangers modern PBXs face, centralized actions are needed in order to both educate the users and secure their telephony systems. Such projects can consist of educational, policy, auditing, technical, documentation, hardware and software solutions and actions, as will be described in the following paragraphs.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/voip-and-pbx-security-and-forensics-pbx-security-yGTZlC5rcm
Publisher
Springer International Publishing
Copyright
© Springer International Publishing Switzerland 2016
ISBN
978-3-319-29720-0
Pages
55 –73
DOI
10.1007/978-3-319-29721-7_4
Publisher site
See Chapter on Publisher Site

Abstract

[While data communications have long before begun to utilize every possible means of protection, enjoying a vivid research and development sector, PBX arena has not caught up. Following the taxonomy of threats and the technical analysis of the previous chapters, in this chapter we will further provide some useful tips and advices for safeguarding PBXs. Due to the multitude of dangers modern PBXs face, centralized actions are needed in order to both educate the users and secure their telephony systems. Such projects can consist of educational, policy, auditing, technical, documentation, hardware and software solutions and actions, as will be described in the following paragraphs.]

Published: Apr 26, 2016

Keywords: PBX security; PBX audit; Physical security; PBX technical security measures; PBX non-technical security measures; DISA security; Voice mail security; Automated attendant security; PBX logs; PBX collaborative project

There are no references for this article.