Skip to main content

Confidentiality, Integrity, and Availability Threats in PBXs

  • Chapter
  • First Online:
Book cover VoIP and PBX Security and Forensics

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 634 Accesses

Abstract

In this introductory chapter we will briefly describe and group as many as possible of the threats in confidentiality, integrity and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akhvlediani M (2009) The fatal flaw: the media and the Russian invasion of Georgia. Small Wars Insurgencies 20(2):363–390

    Article  Google Scholar 

  2. deDECTed. https://dedected.org/trac

  3. Prevelakis V (2007) The Athens affair. IEEE Spectrum, July 2007

    Google Scholar 

  4. The Free Dictionary (2012) Psychological operations. http://www.thefreedictionary.com/psychological+operations

  5. CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud Survey

    Google Scholar 

  6. CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud Survey

    Google Scholar 

  7. Ars Tsechnica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars

  8. Brisbane (2006) http://www.bris2600.com/hall_of_fame/poulsen.php

  9. BBC News (2011) Exeter hospital phones ‘cannot understand Devon accent’. http://www.bbc.co.uk/news/uk-england-devon-14649238

  10. St. Cloud Times Minnesota (2011) BRIEF: fire causes problem for hospital phones. St. Cloud, Minnesota. http://www.newsorganizer.com/article/brief-fire-causes-problem-for--ac0a083204b6cc060f0c2d0edede85fa/

  11. Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and Safety

    Google Scholar 

  12. Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  13. VOIPSA (2005) VoIP security and privacy threat taxonomy public release 1.0, 24 October 2005. http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf

  14. Rhodes-Ousley M (2013) Information security: the complete reference, 2nd edn. McGraw-Hill Education, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Androulidakis, I.I. (2016). Confidentiality, Integrity, and Availability Threats in PBXs. In: VoIP and PBX Security and Forensics. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-29721-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29721-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29720-0

  • Online ISBN: 978-3-319-29721-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics