Lucent Technologies Definity Enterprise Communication Server 8.2 User Manual

Page of 1707
DEFINITY ECS Release 8.2
Administrator’s Guide  
555-233-506  
Issue 1
April 2000
Enhancing system security 
308
Preventing toll fraud 
11
9. Monitor traffic and system activity for abnormal patterns
Activate features that “turn off” access in response to unauthorized access 
attempts.
Use Traffic and Call Detail reports to monitor call activity levels.
10. Educate system users to recognize toll fraud activity and react 
appropriately
From safely using calling cards to securing voice mailbox password, train 
your users on how to protect themselves from inadvertent compromises to 
the system’s security.
11. Monitor access to the dial-up maintenance port. Change the access 
password regularly and issue it only to authorized personnel. Consider 
activating Access Security Gateway.
12. Create a switch system management policy concerning employee turnover 
and include these actions:
a. Delete any unused voice mailboxes in the voice mail system.
b. Immediately delete any voice mailboxes belonging to a terminated 
employee.
c. Immediately remove the authorization code if a terminated 
employee had screen calling privileges and a personal authorization 
code.
d. Immediately change barrier codes and/or authorization codes shared 
by a terminated employee. Notify the remaining users of the change.
e. Remove a terminated employee’s login ID if they had access to the 
system administration interface. Change any associated passwords 
immediately.
13. Back up system files regularly to ensure a timely recovery. Schedule 
regular, off-site backups.
14. Callers misrepresenting themselves as the “phone company,” “AT&T,” 
“RBOCS,” or even known employees within your company may claim to 
be testing the lines and ask to be transferred to “900,” “90,” or ask the 
attendant to do “start 9 release.” This transfer reaches an outside operator, 
allowing the unauthorized caller to place a long distance or international 
call. Instruct your users to never transfer these calls. Do not assume that if 
“trunk to trunk transfer” is blocked this cannot happen.
15. Hackers run random generator PC programs to detect dial tone. Then they 
revisit those lines to break barrier codes and/or authorization codes to make 
fraudulent calls or resell their services. They do this using your telephone 
lines to incur the cost of the call. Frequently these call/sell operations are