Confidentiality, Integrity, and Availability Threats in PBXs

  • Iosif I. Androulidakis
Chapter
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)

Abstract

In this introductory chapter we will briefly describe and group as many as possible of the threats in confidentiality, integrity and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.

Keywords

PBX threats PBX security PBX confidentiality PBX integrity PBX availability Calls interception Telecommunications Fraud 

References

  1. 1.
    Akhvlediani M (2009) The fatal flaw: the media and the Russian invasion of Georgia. Small Wars Insurgencies 20(2):363–390CrossRefGoogle Scholar
  2. 2.
  3. 3.
    Prevelakis V (2007) The Athens affair. IEEE Spectrum, July 2007Google Scholar
  4. 4.
    The Free Dictionary (2012) Psychological operations. http://www.thefreedictionary.com/psychological+operations
  5. 5.
    CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud SurveyGoogle Scholar
  6. 6.
    CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud SurveyGoogle Scholar
  7. 7.
    Ars Tsechnica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars
  8. 8.
  9. 9.
    BBC News (2011) Exeter hospital phones ‘cannot understand Devon accent’. http://www.bbc.co.uk/news/uk-england-devon-14649238
  10. 10.
    St. Cloud Times Minnesota (2011) BRIEF: fire causes problem for hospital phones. St. Cloud, Minnesota. http://www.newsorganizer.com/article/brief-fire-causes-problem-for--ac0a083204b6cc060f0c2d0edede85fa/
  11. 11.
    Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and SafetyGoogle Scholar
  12. 12.
    Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, IndianapolisGoogle Scholar
  13. 13.
    VOIPSA (2005) VoIP security and privacy threat taxonomy public release 1.0, 24 October 2005. http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf
  14. 14.
    Rhodes-Ousley M (2013) Information security: the complete reference, 2nd edn. McGraw-Hill Education, New YorkGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Iosif I. Androulidakis
    • 1
  1. 1.Pedini IoanninaGreece

Personalised recommendations