This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving P
PBX Security and Forensics: A Practical Approach
โ Scribed by Iosif I. Androulidakis (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2013
- Tongue
- English
- Leaves
- 108
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the Public Switched Telephone Network (PSTN). Targeted damages and attacks in PBXs can cause significant instability and problems. The author provides examples of these threats and how to prevent against such attacks in the future. Readers will also be shown where to find forensics data and how to conduct relevant analysis.
โฆ Table of Contents
Front Matter....Pages i-xi
Introduction....Pages 1-8
Confidentiality, Integrity, and Availability Threats in PBXs....Pages 9-21
PBX Technical Details....Pages 23-52
PBX Security....Pages 53-69
PBX Forensics....Pages 71-96
Conclusions....Pages 97-98
โฆ Subjects
Communications Engineering, Networks;Systems and Data Security;Security Science and Technology;Forensic Science
๐ SIMILAR VOLUMES
<p><p>This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics invol
<p><p>Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secret
<p><p>This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones
<p><span>This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a securit
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the n