System information
APPENDIX I
APPENDIX I
PROTECTING YOUR PHONE SYSTEM
A
GAINST TOLL FRAUD
CHAPTER CONTENTS
About toll fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-2
Identifying toll fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-2
Protecting your system against toll fraud . . . . . . . . . . . . . . . . . . . . I-3
Responding to toll fraud attempts . . . . . . . . . . . . . . . . . . . . . . . . . . I-7