Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 271

Toll Fraud Job Aids 
Page F-1 Toll Fraud Warning Signs 
F
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
F
FToll Fraud Job Aids
The job aids in this appendix are tools for your organization to use in securing 
your system against toll fraud. Copy them and distribute them to your staff to post 
or use in any other manner that meets their needs.
Toll Fraud Warning Signs
nCustomers or employees complain that the 800 number is always busy. 
The busy line could even impact local Direct...

Page 272

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Toll Fraud Job Aids 
Page F-2 Toll Fraud Warning Signs 
F
nSudden or unexplained inability to access specific administrative functions 
within the system.
nEmployees complain of difficulty in obtaining an outside line.
nSimultaneous Direct Inward System Access (DISA) authorization code use 
coming from two different places at the same time.
nAn upsurge in use on DISA or other trunks.
nUnusual increase in customer premises equipment-based...

Page 273

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Toll Fraud Job Aids 
Page F-3 System Security Action Plan 
F
System Security Action Plan
Figure F-1. System Security Action Plan
Educate End UsersEstablish Port Security Procedures
Secure the Administration System Perform Security Monitoring
The first step customers should take in
tightening the security of their systems
is to increase end-users’ awareness of
the system’s security features and
vulnerabilities.
Develop and implement a...

Page 274

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Toll Fraud Job Aids 
Page F-4 Top 10 Tips to Help Prevent Phone “Phraud” 
F
Top 10 Tips to Help Prevent Phone 
“Phraud”
1. Protect System Administration Access
Insure secure passwords exist for all logins that allow System 
Administration or Maintenance access to the system. Change the 
passwords frequently.
2. Prevent Voice Mail System Transfer to Dial Tone
Activate “secure transfer” features in voice mail systems.
Place appropriate...

Page 275

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Toll Fraud Job Aids 
Page F-5 Top 10 Tips to Help Prevent Phone “Phraud” 
F
9. Monitor Traffic and System Activity for Abnormal Patterns
Activate features that “Turn Off” access in response to unauthorized 
access attempts.
Use Traffic and Call Detail reports to monitor call activity levels.
10. Educate System Users to Recognize Toll Fraud Activity and React 
Appropriately
From safely using Calling Cards to securing voice mailbox...

Page 276


				            

Page 277

Special Security Product and Service Offers 
Page G-1 Remote Port Security Device (RPSD) 
G
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
G
GSpecial Security Product and Service 
Offers
Remote Port Security Device (RPSD)
The Lucent Technologies RPSD1 offers enhanced protection for dial-up data 
access. Communications systems typically consist of a mix of digital PBXs, voice 
mail systems, and adjunct applications computers. Dial-up ports on these systems 
provide remote access for...

Page 278

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Special Security Product and Service Offers 
Page G-2 Remote Port Security Device (RPSD) 
G
Dial-up ports provide access to data networks and computers that contain critical 
data and software applications. While these ports help to improve productivity and 
increase customer satisfaction, they also provide potential access to hackers.
The Key and Lock use a sophisticated dynamic challenge/response technique to 
assist you in preventing...

Page 279

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Special Security Product and Service Offers 
Page G-3 Security Audit Service 
G
nAn Alarm Contact Closure interface is provided to generate an alarm when 
the Lock loses power.
Lock and Keys work with all data communications protocols.
Lucent Technologies Support
Lucent Technologies provides RPSD Keys to their maintenance centers to 
accommodate access to systems you secure with the RPSD Lock.
For more information on the RPSD, see the...

Page 280

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Special Security Product and Service Offers 
Page G-4 Security Tune-Up Service 
G
Security Tune-Up Service
The Security Tune-Up Service is a fee-based, consultative service designed to 
provide an expedient, on-line review of your system security as it relates to toll 
fraud. This service is provided for the DEFINITY ECS, DEFINITY 
Communications Systems G1, G2, and G3, the DIMENSION PBX System, 
System 75, System 85; and the AUDIX, the...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals