Page 869 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 869

Another voice communication threat is private branch exchange (PBX)
               fraud and abuse. Many PBX systems can be exploited by malicious

               individuals to avoid toll charges and hide their identity. Malicious
               attackers known as phreakers abuse phone systems in much the same
               way that attackers abuse computer networks. Phreakers may be able to
               gain unauthorized access to personal voice mailboxes, redirect
               messages, block access, and redirect inbound and outbound calls.

               Countermeasures to PBX fraud and abuse include many of the same

               precautions you would employ to protect a typical computer network:
               logical or technical controls, administrative controls, and physical
               controls. Here are several key points to keep in mind when designing a
               PBX security solution:

                    Consider replacing remote access or long-distance calling through
                    the PBX with a credit card or calling card system.

                    Restrict dial-in and dial-out features to authorized individuals who
                    require such functionality for their work tasks.


                    If you still have dial-in modems, use unpublished phone numbers
                    that are outside the prefix block range of your voice numbers.

                    Protect administrative interfaces for the PBX.

                    Block or disable any unassigned access codes or accounts.

                    Define an acceptable use policy and train users on how to properly
                    use the system.

                    Log and audit all activities on the PBX and review the audit trails
                    for security and use violations.


                    Disable maintenance modems (i.e., remote access modems used by
                    the vendor to remotely manage, update, and tune a deployed
                    product) and/or any form of remote administrative access.

                    Change all default configurations, especially passwords and
                    capabilities related to administrative or privileged features.

                    Block remote calling (that is, allowing a remote caller to dial in to
                    your PBX and then dial out again, thus directing all toll charges to
                    the PBX host).
   864   865   866   867   868   869   870   871   872   873   874