Abstract
In this introductory chapter we will briefly describe and group as many as possible of the threats in confidentiality, integrity and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akhvlediani M (2009) The fatal flaw: the media and the Russian invasion of Georgia. Small Wars Insurgencies 20(2):363–390
deDECTed. https://dedected.org/trac
Prevelakis V (2007) The Athens affair. IEEE Spectrum, July 2007
The Free Dictionary (2012) Psychological operations. http://www.thefreedictionary.com/psychological+operations
CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud Survey
CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud Survey
Ars Tsechnica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars
Brisbane (2006) http://www.bris2600.com/hall_of_fame/poulsen.php
BBC News (2011) Exeter hospital phones ‘cannot understand Devon accent’. http://www.bbc.co.uk/news/uk-england-devon-14649238
St. Cloud Times Minnesota (2011) BRIEF: fire causes problem for hospital phones. St. Cloud, Minnesota. http://www.newsorganizer.com/article/brief-fire-causes-problem-for--ac0a083204b6cc060f0c2d0edede85fa/
Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and Safety
Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis
VOIPSA (2005) VoIP security and privacy threat taxonomy public release 1.0, 24 October 2005. http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf
Rhodes-Ousley M (2013) Information security: the complete reference, 2nd edn. McGraw-Hill Education, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Androulidakis, I.I. (2016). Confidentiality, Integrity, and Availability Threats in PBXs. In: VoIP and PBX Security and Forensics. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-29721-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-29721-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29720-0
Online ISBN: 978-3-319-29721-7
eBook Packages: EngineeringEngineering (R0)