Technical information

Security Risks
3-12 Issue 7 June 2001
Limit calling
permissions
COS (G2 and
System 85 only)
Set COS
restrictions
COR (G1, G3,
and System 75
only)
Set FRL
Set calling party
restrictions or
outward
restrictions
Set COR to COR
restrictions
Require account
code before calls
Forced entry of
account code
Set account code
length
Administer as
required
Create
time-dependent
limits on access
to route patterns
Alternate FRL
(G2 and G3r
only)
Set lowest value
possible
Suppress dial
tone after
ARS/WCR
feature access
code
Suppress dial
tone
Turn off
ARS/WCR dial
tone
Screen all
AAR/ARS calls
World Class
Routing (G2.2
and G3 only)
Administer all
capabilities
Table 3-1. Security Goals: DEFINITY ECS, DEFINITY Communications
Systems, System 75 and System 85 (Continued)
Security Goal Method Security Tool Steps
Continued on next page