1

Click here to load reader

Secure PBX

Embed Size (px)

Citation preview

Page 1: Secure PBX

Network Security Amil 1995

may occur at any time. According to Schwartau, who identified the device, a HERF gun, in its simplest application, is a radio transmitter capable of shooting high-frequency radio waves which will decommission its electronic target. This happens by forcing the electronic circuit to overload and malfunction, When attacked, the information system is transformed into a string of meaningless data bytes which can shut down a computer, crash a network, or put a telephone switch into endless orbit.

Keeter. “Most crimes are perpetrated through remote access connections to voice and data communications systems, and TraqNet helps protect remote access ports.”

The TraqNet system is used with Hayward, California-based LeeMah Datacom Security’s InfoKey data access and InfoCard voice access security software, A caller dials the access number and is automatically transferred to TraqNet. The caller then enters a Personal Identification Number, which is ‘challenged’ with a TraqNet encrypted number. If the proper pre-coded InfoKey or InfoCard number is entered in response, authorization and system access is granted.

Comdisco Inc. is considering ATM as a means of getting disabled systems up and running in a matter of minutes. Presently testing ATM over a number of US service providers’ networks, Comdisco plans to initially provide its customers with public asynchronous transfer mode (ATM) services later this year. Using the public networks provided by WilTel and perhaps AT&T, Comdisco is also considering broadening its USS38 million ATM program to include the use of ATM to mirror its customers’ networks,

Only three components are necessary for a HERF gun to be effective: the device needs a source of energy - the more energy it can transmit, the more damage will occur. It also needs to store the energy until it is fired, and it requires a means of output, such as an antenna.

An EMP/T bomb works along the same principles as a HERF gun, but can zap its target with a force one thousand times more powerful.

TraqNet interfaces with Siemens Rolm computerized branch exchange lines and PhoneMail units, and can be used to secure systems with up to 128 voice and data remote access ports and maintenance ports,

ATM would provide the large amount of bandwidth (Tl) necessary to backup several LANs simultaneously, perhaps letting Comdisco automatically backup the data on each of its customers’ servers, Replacing its current use of lease lines for data vaulting, such ATM services could completely replace the off-site data storage used today.

Secure PBX

“ATM is a viable [backup and recovery] solution”, said Comdisco’s Mary Jung. “Comdisco is looking at ATM to provide continuous availability services, but no services are available as yet.”

Lisa Armstrong

The first combination voice and data security system for PBX lines has been announced by a Silicon Valley start-up.

“We can’t guarantee any PBX to be invulnerable, and customers must follow correct security procedures”, said Keeter. “However, the partnership between Siemens Rolm and LeeMah is another step toward increasing system security.”

Santa Clara, California-based PBX vendor Siemens Rolm Communications Inc. is implementing LeeMah Datacom Security Corp.‘s TraqNet 2000-SR remote access security system on all of its private branch exchanges.

Increases in the number of remote access ports and the expansion of remote access computing has provided hackers with expanded options for system violation. Computer-related crime cost US businesses an estimated US$4 billion in toll fraud in 1994.

The use of ATM for backup and recovery is a logical move, according to John Coons, telecommunications analyst with market research firm Dataquest. Coons noted that 20 years ago ATM was originally envisioned as a means of providing disaster recovery services and Comdisco’s tests mark the technology’s fulfirment of its original goal.

“We want to give our customers every possible defense against break-ins by hackers”, said Siemens Rolm senior product manager Bryan

Vaulting with ATM

Brian Riggs

Exploring the future of LAN backup and recovery,

“But ATM offerings are not yet usage sensitive in price”, he warned, saying that usage-based pricing schemes are the only way telecom service providers will solicit the interest of smaller companies.

8 01995 Elsevier Science Ltd