19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.14 Call charges fraud<br />

Numerous reports of call charges fraud by hackers concerning PBX systems<br />

have recently been reported in the press. Such manipulations can be carried<br />

out in various ways. On the one hand. it may be that existing features of a<br />

PBX system can be abused for this purpose. For example, call redirections or<br />

dial-in options which can be remotely programmed are suitable for this. On<br />

the other hand, rights can be granted in such a way that incoming "exchange<br />

lines" occupy outgoing "exchange lines". As a result, when a certain number is<br />

dialled from outside, the caller can be directly connected with the "exchange".<br />

However, this takes place at the expense of the PBX system provider.<br />

Another type of call-charges fraud can be caused by the user himself. By<br />

various means, e.g. making telephone calls from other people's telephone sets,<br />

reading out other people's identifiers (passwords) or modifying personal<br />

privileges, an attempt can be made to make calls at the expense of the<br />

employer or of other staff members.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!