Skip to main content

Introduction

  • Chapter
  • First Online:
VoIP and PBX Security and Forensics

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 609 Accesses

Abstract

In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Other uses of the PBX acronym include frightening terms such as polymer-bonded eXplosive, plastic-bonded eXplosive and pre-B-cell leukemia homeoboX!

  2. 2.

    Council of the European Union. 2008. “COUNCIL DIRECTIVE 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection.” European Union. (http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33260_en.htm).

References

  1. Walsh TJ, Kuhn DR (2005) Challenges in securing voice over IP. IEEE Secur Priv 3(3):44–49

    Article  Google Scholar 

  2. Geers K (2011) Strategic cyber security. CCD COE, Tallinn, Estonia

    Google Scholar 

  3. West D (2000) De-mystifying telecom fraud. Telecom Business, July 2000

    Google Scholar 

  4. Blake V (2000) PABX security, information security technical report, vol 5, no 2, pp 34–42

    Google Scholar 

  5. Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  6. Androulidakis I (2010) Detecting cybercrime in modern telecommunication systems. In: European Police College (CEPOL), Seminar 64/2010, Cyber Crime & High Tech, Athens, 18–21 May 2010

    Google Scholar 

  7. Androulidakis I (2011) Cybercrime in fixed telephony systems. In: European Police College (CEPOL), Seminar 62/2011, High Tech & Cyber Crime, Brdo near Kranj, Slovenia, 20 Oct 2011

    Google Scholar 

  8. Archer K, White GB et al (2001) Voice and data security. Sams Publishing, Indianapolis

    Google Scholar 

  9. Pollard C (2005) Telecom fraud: the cost of doing nothing just went up, White paper. Insight consulting, Feb 2005

    Google Scholar 

  10. Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and Safety

    Google Scholar 

  11. CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud Survey

    Google Scholar 

  12. CFCA (2015) Global Fraud Loss Survey. http://www.cfca.org/pdf/survey/2015_CFCA_Global_Fraud_Loss_Survey_Press_Release.pdf

  13. CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud Survey

    Google Scholar 

  14. Ars Technica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars

  15. Avaya Inc (2002) Avaya products security handbook, issue 8, Chap. 2

    Google Scholar 

  16. Wikipedia, Phreaking. http://en.wikipedia.org/wiki/Phreaking

  17. Ottis R (2011) Theoretical offensive cyber militia models. In: Proceedings of the 6th international conference on information warfare and security, Washington, DC

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Androulidakis, I.I. (2016). Introduction. In: VoIP and PBX Security and Forensics. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-29721-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29721-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29720-0

  • Online ISBN: 978-3-319-29721-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics