Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 11
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page xi nToll Fraud Contact ListG-5 H Product Security Checklists H-1 nGeneral Security ProceduresH-3 nAUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging SystemsH-5 nAUDIX Voice Power SystemH-7 nBasicWorksH-9 nCONVERSANT Voice Information SystemH-13 nDEFINITY ECS, DEFINITY G1 and G3, and System75H-15 nDEFINITY G2 and System85H-21 nDIMENSION PBX SystemH-25 nLucent Technologies/Bay NetworksH-28 nMERLIN II Communications...
Page 13
About This Document Page xiii Scope of this Handbook BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Scope of this Handbook This handbook discusses security risks and measures that can help prevent external telecommunications fraud involving the following Lucent Technologies products: Communications Server: nDEFINITY® Enterprise Communications Server (ECS) Release 5 and later PBX systems: nDEFINITY® Generic 1, 2, and 3 Communications Systems nMERLIN® II...
Page 14
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xiv Scope of this Handbook nDEFINITY® AUDIX® System nINTUITY™ AUDIX® Voice Messaging System nINTUITY™ CONVERSANT® Voice Information System nMERLIN MAIL® Voice Messaging System nMERLIN MAIL®-ML Voice Messaging System nMERLIN MAIL® R3 Voice Messaging System nPARTNER MAIL® System nPARTNER MAIL VS® System Other products and services: nCall Management System (R3V2) nCallMaster® PC nMultipoint Conferencing Unit...
Page 15
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xv Reason for Reissue nEnroll in Lucent Technologies BCS Advanced Security for DEFINITY ECS This advanced 2-day training course provides additional technical methods and procedures in recognizing and preventing toll fraud for the DEFINITY user. To enroll, call 1 800 255-8988, PEC 1460-095. Reason for Reissue This issue, Issue 6 of the GBCS Products Security Handbook, updates information to include the...
Page 16
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xvi How this Guide is Organized How this Guide is Organized The GBCS Products Security Handbook has the following chapters and appendices: Chapter 1: Introduction Provides a background for toll fraud. Chapter 2: Security RisksDiscusses the major areas in which customer premises equipment-based systems are vulnerable, and introduces available security measures. Chapter 3: Large Business Communications...
Page 17
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xvii Lucent Technologies’ Statement of Direction Lucent Technologies’ Statement of Direction The telecommunications industry is faced with a significant and growing problem of theft of customer services. To aid in combating these crimes, Lucent Technologies intends to strengthen relationships with its customers and its support of law enforcement officials in apprehending and successfully prosecuting those...
Page 18
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xviii Lucent Technologies/Customer Security Roles and Responsibilities nLucent Technologies is committed to develop and offer services that, for a fee, reduce or eliminate customer liability for PBX toll fraud, provided the customer implements prescribed security requirements in its telecommunications systems. nLucent Technologies’ product and service literature, marketing information and contractual...
Page 19
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xix Lucent Technologies/Customer Security Roles and Responsibilities (See the preceding section.) More specifically, Lucent Technologies BCS recognized four areas where we or our agents had specific responsibilities to our customers. These areas, and our responsibilities in each area, are detailed in the next section, “Lucent Technologies’ Roles and Responsibilities.” In addition, customers have specific...
Page 20
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 About This Document Page xx Lucent Technologies Security Offerings Customer Roles and Responsibilities The customer as the business owner has the responsibility to SELECT AND MANAGE the security of their system. Specifically, according to the TFPC of the Alliance for Telecommunications: “The basic responsibility of the business owner is to devote adequate resources (time, talent, capital, etc.) to the selection of CPE and to its...