Instruction manual
Voice messaging systems
7-34 Issue 9 May 2003
Security measures
Design applications with toll fraud in mind.
■ Make sure the application verifies that long distance numbers are not being 
requested, or that only permitted numbers are requested. The Transfer Call 
and Call Bridge capabilities of Script Builder, and the “tic” instruction at the 
transaction state machine (TSM) script level provide network access. If the 
ASAI package is loaded, additional TSM instructions and libraries provide 
access using the ASAI facility. In addition, a poorly designed prompt and 
collect action for transfer could let the caller enter any number for an 
outside access number.
■ If numbers are contained in a database where anyone with database 
access can change them, or if they are entered by the caller, fraud is 
possible. Build the numbers into the application, or have the application 
control them to minimize the possibility of toll fraud.
■ The VIS Feature Test (feature_tst) package contains application programs 
that can be assigned to channels to test system components that allow any 
4-digit number to be dialed, such as transfer and call bridging. The 
application should not be assigned to a channel, or the package should not 
be loaded except when these tests are being used.
■ Anyone with access to application code can hide logic in it that provides 
network access and is triggered under specific circumstances. Make sure 
that only trusted individuals can access application code.
■ An application can be audited using Automatic Number Identification (ANI) 
capabilities through PRI and ASAI (or normal call data tools) to set up local 
database tables to collect numbers. If a significant number of repeat 
inbound calls are identified, an administrator can be notified using the 
Netview package, UNIX, or ARU, or an application can be spawned to call 
someone to alert the administrator about the calls.
 Protect local and remote access.
■ Restrict login access to trusted individuals with a need to maintain or 
administer the system.
■ Restrict remote login access.
■ Use the administrative interface and its security classes for logins. Certain 
capabilities are restricted for particular classes. For example, the 
Operations class cannot modify applications.
■ Make sure when you use a modem that it is administered properly to 
prevent access by outside users. Make sure the phone is disconnected 
from the modem when the modem is not in use, or use the RPSD lock.
■ Use standard UNIX tools to monitor login statistics.










