Private Branch eXchange (PBX)

Slides:



Advertisements
Similar presentations
© Jörg Liebeherr, CS757 Three Network Technologies Telephone Network –The largest worldwide computer network, specialized for voice –Switching.
Advertisements

There are many types of WAN technologies that can be used to solve the problems of users who need network access from remote locations. We will go through.
Nortel Meridian 1 – Option 11C Family of Definity PBXs
University of Baltimore Telecommunications Technology
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lecture 1: Overview modified from slides of Lawrie Brown.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals
Chapter 6 Telecommunications & Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Data Communications Circuit Switching. Switching Networks Long distance transmission is typically done over a network of switched nodes Nodes not concerned.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
COEN 252: Computer Forensics Router Investigation.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
BASIC TELECOMMUNICATIONS
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 CCM Deployment Models Wael K. Valencia Community College.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Chapter 4 Computer Networks – Part 1
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
National Institute of Science and Technology Technical Seminar Presentation Tapash Behera EC Private Branch Exchange At NIST, Berhampur Presented.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Telecom Terms and Concepts Introduction to terms.
CSCI 465 D ata Communications and Networks Lecture 13 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Appendix A UM in Microsoft® Exchange Server 2010.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
William Stallings Data and Computer Communications Chapter 9 Circuit Switching.
ACM 511 Introduction to Computer Networks. Computer Networks.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Module 10: Windows Firewall and Caching Fundamentals.
Private branch exchange
TS workshop 2004U. Epting, M.C. Morodo Testa - TS department1 Improving Industrial Process Control Systems Security Uwe Epting (TS/CSE) Maria Carmen Morodo.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
On-Site PBX Vs Hosted PBX.
Securing Network Servers
CONNECTING TO THE INTERNET
SIX MONTHS INDUSTRIAL TRAINING REPORT
Secure Software Confidentiality Integrity Data Security Authentication
Firewalls.
Security in Networking
IS4550 Security Policies and Implementation
– Chapter 3 – Device Security (B)
* Essential Network Security Book Slides.
AbbottLink™ - IP Address Overview
Designing IIS Security (IIS – Internet Information Service)
Global One Communications
Presentation transcript:

Private Branch eXchange (PBX) sanmi fakiyesi

PBX overview PBXs are also referred to as: PABX – Private Automatic Branch eXchange EPABX–Electronic Private Automatic Branch eXchange PBXs make connections among the internal telephones of a private org – usually a business and also connect them to the public switched telephone network (PSTN) via trunk lines.

Purpose of PBX One of the principal purposes of a PBX is to save the cost of requiring a line for each user to the telephone company’s central office. it is easier to call someone within a PBX because only three or four digits need to be dialed.

PBX issues A private branch exchange (PBX) is a sophisticated computer-based switch that can be thought of as essentially a small, in-house phone company for the org. that operates it. As part of organization’s communication infrastructures, it security is a concern. PBX has moved from analog technology to software-based digital technology. As a result of it capabilities and therefore deployment by orgs, new doors of opportunities have been opened to the intruders to exploit the system.

Current trends Currently there are four distinct types of PBX in use PBX (Private and circuit switched) Hosted/Virtual PBX IP PBX (Private and packet switched) Mobile PBX

Attributes of today’s PBX Ability to use more than two telephone trunk (multiple phone) lines. The use of digital phone that permit integrated voice/data workstations. Scalable computer-based PBX system. Distributed arch. with multiple switches in hierarchical or meshed configuration to provide enhanced reliability. Non-blocking configurations where all attached devices can be engaged in calls simultaneously. The network of lines within the PBX. An operator console or switchboard for a human operator.

PBX Risks Some of the threats to PBX are: Theft of service Disclosure of information without authorization either by deliberate action or by accident Data modification – reordering, deletion or modification Unauthorized access Denial of service Traffic analysis – a passive attack

PBX Peculiar Threats & Vulnerabilities External access/control – PBXs require remote maintenance by vendor/updates by the manufacturer instead of relying on local administrators to make OS updates and patches which exposes the coy to large pool of outside parties. Feature richness –the wide variety of features available on PBX provide the possibility of unexpected attacks. (e.g a feature may be used by an attacker in a manner that was not intended by its designers) -see exhibit 5.4 on page 435 for PBX features and corresponding risks

Other weaknesses Uncontrolled definition of direct inward dial (DID) lines, which would allow an external party to request a dial tone locally, and then make an unauthorized long-distance phone call. Lack of system access controls for long-distance phone calls (e.g unchanged default system vendor password, 24/7 availability of PBX lines). Lack of blocking controls for long-distance phone calls to particular numbers (e.g hot nos or cellular nos). Lack of control over the nos destined for fax machines and modems. Not activating the option to register calls, which enables the use of call-tracking logs.

PBX SECURITY Configure and secure separate and dedicated administrative ports. Control the definition of DID lines to avoid an external party requesting a dial tone locally, disabling that person’s ability to make unauthorized long-distance calls. Establish system access controls over long-distance phone calls. Block controls for LDCs to particular nos. Establish control over the nos destined for fax machines and modems. Activate the option to register calls, enabling the use of call-tracking logs.

PBX SECURITY -contd Physical security of the PBX facilities. Usage of appropriate anti-tamper devices on critical hardware components. Where the vendor/manufacturer needs a remote access to the switch, dial-back modem usage is a basic precaution. Establish strong authentication of external technicians. Keep maintenance terminals in a locked, restricted area. Turn off maintenance features when not needed, if possible. Regular updates of software patches. Deployment of PBX firewall to enhance it protection.