Abstract
In this introductory chapter we will briefly describe what a PBX is and some of its features. We will then argue about its importance as part of a nation’s critical infrastructure. As we will see the telecom fraud and abuse scene involving PBXs is quite active, with many players targeting the confidentiality, integrity and availability of PBXs. Despite the “age” of the term PBX, and the move towards VoIP, both systems face essentially the same problems and as such the analysis remains timely.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Other uses of the PBX acronym include frightening terms such as polymer-bonded eXplosive, plastic-bonded eXplosive and pre-B-cell leukemia homeoboX!
- 2.
Council of the European Union. 2008. “COUNCIL DIRECTIVE 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection.” European Union. (http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33260_en.htm).
References
Walsh TJ, Kuhn DR (2005) Challenges in securing voice over IP. IEEE Secur Priv 3(3):44–49
Geers K (2011) Strategic cyber security. CCD COE, Tallinn, Estonia
West D (2000) De-mystifying telecom fraud. Telecom Business, July 2000
Blake V (2000) PABX security, information security technical report, vol 5, no 2, pp 34–42
Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis
Androulidakis I (2010) Detecting cybercrime in modern telecommunication systems. In: European Police College (CEPOL), Seminar 64/2010, Cyber Crime & High Tech, Athens, 18–21 May 2010
Androulidakis I (2011) Cybercrime in fixed telephony systems. In: European Police College (CEPOL), Seminar 62/2011, High Tech & Cyber Crime, Brdo near Kranj, Slovenia, 20 Oct 2011
Archer K, White GB et al (2001) Voice and data security. Sams Publishing, Indianapolis
Pollard C (2005) Telecom fraud: the cost of doing nothing just went up, White paper. Insight consulting, Feb 2005
Luiijf E, Klaver M (2011) Insufficient situational awareness about critical infrastructures by emergency management. TNO Defence, Security and Safety
CFCA, Communications Fraud Control Association (2009) Worldwide Telecom Fraud Survey
CFCA (2015) Global Fraud Loss Survey. http://www.cfca.org/pdf/survey/2015_CFCA_Global_Fraud_Loss_Survey_Press_Release.pdf
CFCA, Communications Fraud Control Association (2003) Worldwide Telecom Fraud Survey
Ars Technica (2011) How Filipino phreakers turned PBX systems into cash machines for terrorists. http://arstechnica.com/tech-policy/news/2011/11/how-filipino-phreakers-turned-pbx-systems-into-cash-machines-for-terrorists.ars
Avaya Inc (2002) Avaya products security handbook, issue 8, Chap. 2
Wikipedia, Phreaking. http://en.wikipedia.org/wiki/Phreaking
Ottis R (2011) Theoretical offensive cyber militia models. In: Proceedings of the 6th international conference on information warfare and security, Washington, DC
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Androulidakis, I.I. (2016). Introduction. In: VoIP and PBX Security and Forensics. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-29721-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-29721-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29720-0
Online ISBN: 978-3-319-29721-7
eBook Packages: EngineeringEngineering (R0)