Instruction manual
Issue 9 May 2003 4-1
4
Security risks
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx
and later” include the specified DEFINITY G3 (and more recent) versions,
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
Overview
In order for your system to be secure against toll fraud, you need to address
access, egress, and system administration. This handbook addresses those
concerns. In addition, the risk of PBX-based toll fraud increases when any of the
following products and features are used:
■ Remote Access
■ Automated Attendant
■ Other port security risks
■ Voice Messaging
■ Administration and maintenance access
■ Vectors associated with the DEFINITY ECS and DEFINITY
communications systems
All these features offer benefits which allow companies to increase their
availability to their customers and the productivity of their workforce. However, this
chapter takes a look at these features from a different point-of-view: how can
these features, when combined with other outgoing features, such as dial access
to trunks, make a PBX system more vulnerable to toll fraud?
The remainder of this chapter discusses general security measures you can take
to protect your system. Chapters 3 through 6 discuss the specific actions that help
prevent these features from being the target of unauthorized use.