Access the full text.
Sign up today, get DeepDyve free for 14 days.
[While data communications have long before begun to utilize every possible means of protection, enjoying a vivid research and development sector, PBX arena has not caught up. Following the taxonomy of threats and the technical analysis of the previous chapters, in this chapter we will further provide some useful tips and advices for safeguarding PBXs. Due to the multitude of dangers modern PBXs face, centralized actions are needed in order to both educate the users and secure their telephony systems. Such projects can consist of educational, policy, auditing, technical, documentation, hardware and software solutions and actions, as will be described in the following paragraphs.]
Published: Apr 26, 2016
Keywords: PBX security; PBX audit; Physical security; PBX technical security measures; PBX non-technical security measures; DISA security; Voice mail security; Automated attendant security; PBX logs; PBX collaborative project
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.