skip to content
PBX vulnerability analysis : finding holes in your PBX before someone else does Preview this item
ClosePreview this item
Checking...

PBX vulnerability analysis : finding holes in your PBX before someone else does

Author: D Richard Kuhn; National Institute of Standards and Technology (U.S.)
Publisher: Gaithersburg, Md. : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2001]
Series: NIST special publication., Computer security.; NIST special publication, 800-24.
Edition/Format:   eBook : Document : National government publication : EnglishView all editions and formats
Summary:
This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative Database/Software; and User Features. The methods described in this report are designed to assist administrators in  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Microfiche:
Kuhn, D. Richard.
PBX vulnerability analysis.
(OCoLC)48173047
Print version:
Kuhn, D. Richard.
PBX vulnerability analysis.
(OCoLC)47088207
Material Type: Document, Government publication, National government publication, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: D Richard Kuhn; National Institute of Standards and Technology (U.S.)
OCLC Number: 713557480
Notes: "April 2001."
Description: 1 online resource (v, 60 pages) : illustrations.
Series Title: NIST special publication., Computer security.; NIST special publication, 800-24.
Other Titles: Private branch exchange vulnerability analysis :
Finding holes in your PBX before someone else does
Responsibility: D. Richard Kuhn.

Abstract:

This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative Database/Software; and User Features. The methods described in this report are designed to assist administrators in conducting this type of testing. Computer based telephony systems and new techniques such as voice over IP (VOIP) present an entirely new collection of vulnerabilities and are not addressed in this report. However, some of the evaluation methods described here may be applied to these systems as well.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/713557480> # PBX vulnerability analysis : finding holes in your PBX before someone else does
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
   library:oclcnum "713557480" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mdu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/864074745#Place/gaithersburg_md> ; # Gaithersburg, Md.
   schema:about <http://experiment.worldcat.org/entity/work/data/864074745#Thing/pbx> ; # PBX
   schema:about <http://experiment.worldcat.org/entity/work/data/864074745#Thing/private_branch_exchange> ; # Private branch exchange
   schema:about <http://experiment.worldcat.org/entity/work/data/864074745#Thing/computer_security> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/864074745#Topic/telephone_private_branch_exchanges_security_measures_united_states> ; # Telephone--Private branch exchanges--Security measures--United States
   schema:about <http://experiment.worldcat.org/entity/work/data/864074745#Thing/telecommunications_security> ; # Telecommunications security
   schema:about <http://id.worldcat.org/fast/1204155> ; # United States
   schema:alternateName "Finding holes in your PBX before someone else does" ;
   schema:alternateName "Private branch exchange vulnerability analysis :" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/131110795> ; # National Institute of Standards and Technology (U.S.)
   schema:creator <http://viaf.org/viaf/75301472> ; # D Richard Kuhn
   schema:datePublished "2001" ;
   schema:description "This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative Database/Software; and User Features. The methods described in this report are designed to assist administrators in conducting this type of testing. Computer based telephony systems and new techniques such as voice over IP (VOIP) present an entirely new collection of vulnerabilities and are not addressed in this report. However, some of the evaluation methods described here may be applied to these systems as well."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/864074745> ;
   schema:genre "National government publication"@en ;
   schema:genre "Government publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/864074745#Series/nist_special_publication> ; # NIST special publication ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/864074745#Series/nist_special_publication_computer_security> ; # NIST special publication ; Computer security
   schema:isSimilarTo <http://www.worldcat.org/oclc/48173047> ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/47088207> ;
   schema:name "PBX vulnerability analysis : finding holes in your PBX before someone else does"@en ;
   schema:productID "713557480" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/713557480#PublicationEvent/gaithersburg_md_u_s_dept_of_commerce_technology_administration_national_institute_of_standards_and_technology_2001> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/864074745#Agent/u_s_dept_of_commerce_technology_administration_national_institute_of_standards_and_technology> ; # U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
   schema:url <http://dx.doi.org/10.6028/NIST.SP.800-24> ;
   schema:url <http://purl.fdlp.gov/GPO/LPS115521> ;
   schema:url <http://csrc.nist.gov/publications/nistpubs/800-24/sp800-24pbx.pdf> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/713557480> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/864074745#Agent/u_s_dept_of_commerce_technology_administration_national_institute_of_standards_and_technology> # U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
    a bgn:Agent ;
   schema:name "U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology" ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Place/gaithersburg_md> # Gaithersburg, Md.
    a schema:Place ;
   schema:name "Gaithersburg, Md." ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Series/nist_special_publication> # NIST special publication ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/713557480> ; # PBX vulnerability analysis : finding holes in your PBX before someone else does
   schema:name "NIST special publication ;" ;
   schema:name "NIST special publication." ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Series/nist_special_publication_computer_security> # NIST special publication ; Computer security
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/713557480> ; # PBX vulnerability analysis : finding holes in your PBX before someone else does
   schema:name "NIST special publication ; Computer security" ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Thing/computer_security> # Computer security
    a schema:Thing ;
   schema:name "Computer security" ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Thing/private_branch_exchange> # Private branch exchange
    a schema:Thing ;
   schema:name "Private branch exchange" ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Thing/telecommunications_security> # Telecommunications security
    a schema:Thing ;
   schema:name "Telecommunications security" ;
    .

<http://experiment.worldcat.org/entity/work/data/864074745#Topic/telephone_private_branch_exchanges_security_measures_united_states> # Telephone--Private branch exchanges--Security measures--United States
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh85133391> ;
   schema:name "Telephone--Private branch exchanges--Security measures--United States"@en ;
    .

<http://id.worldcat.org/fast/1204155> # United States
    a schema:Place ;
   schema:name "United States" ;
    .

<http://viaf.org/viaf/131110795> # National Institute of Standards and Technology (U.S.)
    a schema:Organization ;
   schema:name "National Institute of Standards and Technology (U.S.)" ;
    .

<http://viaf.org/viaf/75301472> # D Richard Kuhn
    a schema:Person ;
   schema:familyName "Kuhn" ;
   schema:givenName "D. Richard" ;
   schema:name "D Richard Kuhn" ;
    .

<http://www.worldcat.org/oclc/47088207>
    a schema:CreativeWork ;
   rdfs:label "PBX vulnerability analysis." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/713557480> ; # PBX vulnerability analysis : finding holes in your PBX before someone else does
    .

<http://www.worldcat.org/oclc/48173047>
    a schema:CreativeWork ;
   rdfs:label "PBX vulnerability analysis." ;
   schema:description "Microfiche:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/713557480> ; # PBX vulnerability analysis : finding holes in your PBX before someone else does
    .

<http://www.worldcat.org/title/-/oclc/713557480>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/713557480> ; # PBX vulnerability analysis : finding holes in your PBX before someone else does
   schema:dateModified "2017-12-24" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.