Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 271
Toll Fraud Job Aids Page F-1 Toll Fraud Warning Signs F BCS Products Security Handbook 555-025-600 Issue 6 December 1997 F FToll Fraud Job Aids The job aids in this appendix are tools for your organization to use in securing your system against toll fraud. Copy them and distribute them to your staff to post or use in any other manner that meets their needs. Toll Fraud Warning Signs nCustomers or employees complain that the 800 number is always busy. The busy line could even impact local Direct...
Page 272
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Toll Fraud Job Aids Page F-2 Toll Fraud Warning Signs F nSudden or unexplained inability to access specific administrative functions within the system. nEmployees complain of difficulty in obtaining an outside line. nSimultaneous Direct Inward System Access (DISA) authorization code use coming from two different places at the same time. nAn upsurge in use on DISA or other trunks. nUnusual increase in customer premises equipment-based...
Page 273
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Toll Fraud Job Aids Page F-3 System Security Action Plan F System Security Action Plan Figure F-1. System Security Action Plan Educate End UsersEstablish Port Security Procedures Secure the Administration System Perform Security Monitoring The first step customers should take in tightening the security of their systems is to increase end-users’ awareness of the system’s security features and vulnerabilities. Develop and implement a...
Page 274
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Toll Fraud Job Aids Page F-4 Top 10 Tips to Help Prevent Phone “Phraud” F Top 10 Tips to Help Prevent Phone “Phraud” 1. Protect System Administration Access Insure secure passwords exist for all logins that allow System Administration or Maintenance access to the system. Change the passwords frequently. 2. Prevent Voice Mail System Transfer to Dial Tone Activate “secure transfer” features in voice mail systems. Place appropriate...
Page 275
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Toll Fraud Job Aids Page F-5 Top 10 Tips to Help Prevent Phone “Phraud” F 9. Monitor Traffic and System Activity for Abnormal Patterns Activate features that “Turn Off” access in response to unauthorized access attempts. Use Traffic and Call Detail reports to monitor call activity levels. 10. Educate System Users to Recognize Toll Fraud Activity and React Appropriately From safely using Calling Cards to securing voice mailbox...
Page 277
Special Security Product and Service Offers Page G-1 Remote Port Security Device (RPSD) G BCS Products Security Handbook 555-025-600 Issue 6 December 1997 G GSpecial Security Product and Service Offers Remote Port Security Device (RPSD) The Lucent Technologies RPSD1 offers enhanced protection for dial-up data access. Communications systems typically consist of a mix of digital PBXs, voice mail systems, and adjunct applications computers. Dial-up ports on these systems provide remote access for...
Page 278
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Special Security Product and Service Offers Page G-2 Remote Port Security Device (RPSD) G Dial-up ports provide access to data networks and computers that contain critical data and software applications. While these ports help to improve productivity and increase customer satisfaction, they also provide potential access to hackers. The Key and Lock use a sophisticated dynamic challenge/response technique to assist you in preventing...
Page 279
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Special Security Product and Service Offers Page G-3 Security Audit Service G nAn Alarm Contact Closure interface is provided to generate an alarm when the Lock loses power. Lock and Keys work with all data communications protocols. Lucent Technologies Support Lucent Technologies provides RPSD Keys to their maintenance centers to accommodate access to systems you secure with the RPSD Lock. For more information on the RPSD, see the...
Page 280
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Special Security Product and Service Offers Page G-4 Security Tune-Up Service G Security Tune-Up Service The Security Tune-Up Service is a fee-based, consultative service designed to provide an expedient, on-line review of your system security as it relates to toll fraud. This service is provided for the DEFINITY ECS, DEFINITY Communications Systems G1, G2, and G3, the DIMENSION PBX System, System 75, System 85; and the AUDIX, the...