Skip to main content

Confidentiality, Integrity, and Availability Threats in PBXs

  • Chapter
  • First Online:
PBX Security and Forensics

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 620 Accesses

Abstract

In this introductory chapter, we will briefly describe and group as many as possible of the threats in confidentiality, integrity, and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akhvlediani M (2009) The fatal flaw: the media and the Russian invasion of Georgia. Small Wars Insurgencies 20(2):363–390

    Article  Google Scholar 

  2. deDECTed. https://dedected.org/trac

  3. Prevelakis V (2007) The Athens affair. IEEE Spectrum, July 2007

    Google Scholar 

  4. The Free Dictionary (2012) Psychological operations. http://www.thefreedictionary.com/psychological+operations

  5. CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud Survey

    Google Scholar 

  6. CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud Survey

    Google Scholar 

  7. Ars Tsechnica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars

  8. Brisbane (2006) http://www.bris2600.com/hall_of_fame/poulsen.php

  9. BBC News (2011) Exeter hospital phones ‘cannot understand Devon accent’. http://www.bbc.co.uk/news/uk-england-devon-14649238

  10. St. Cloud Times Minnesota (2011) BRIEF: fire causes problem for hospital phones. St. Cloud, Minnesota. http://www.newsorganizer.com/article/brief-fire-causes-problem-for--ac0a083204b6cc060f0c2d0edede85fa/

  11. Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and Safety

    Google Scholar 

  12. Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  13. VOIPSA (2005) VoIP security and privacy threat taxonomy public release 1.0, 24 October 2005. http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 the author

About this chapter

Cite this chapter

Androulidakis, I.I. (2013). Confidentiality, Integrity, and Availability Threats in PBXs. In: PBX Security and Forensics. SpringerBriefs in Electrical and Computer Engineering. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1656-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1656-2_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1655-5

  • Online ISBN: 978-1-4614-1656-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics