Confidentiality, Integrity, and Availability Threats in PBXs

  • Iosif I. Androulidakis
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)


In this introductory chapter, we will briefly describe and group as many as possible of the threats in confidentiality, integrity, and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.


Field Programmable Gate Array Money Laundering International Circuit Social Engineering Telephone Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Akhvlediani M (2009) The fatal flaw: the media and the Russian invasion of Georgia. Small Wars Insurgencies 20(2):363–390CrossRefGoogle Scholar
  2. 2.
  3. 3.
    Prevelakis V (2007) The Athens affair. IEEE Spectrum, July 2007Google Scholar
  4. 4.
    The Free Dictionary (2012) Psychological operations.
  5. 5.
    CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud SurveyGoogle Scholar
  6. 6.
    CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud SurveyGoogle Scholar
  7. 7.
    Ars Tsechnica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists.
  8. 8.
  9. 9.
    BBC News (2011) Exeter hospital phones ‘cannot understand Devon accent’.
  10. 10.
    St. Cloud Times Minnesota (2011) BRIEF: fire causes problem for hospital phones. St. Cloud, Minnesota.
  11. 11.
    Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and SafetyGoogle Scholar
  12. 12.
    Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, IndianapolisGoogle Scholar
  13. 13.
    VOIPSA (2005) VoIP security and privacy threat taxonomy public release 1.0, 24 October 2005.

Copyright information

© the author 2013

Authors and Affiliations

  • Iosif I. Androulidakis
    • 1
  1. 1.PapagouGreece

Personalised recommendations