Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-24

PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does

Date Published: April 2001

Withdrawn: August 01, 2018

Planning Note (8/1/2018): Withdrawn: Does not address newer technologies, such as Voice Over IP (VOIP); includes references to “security controls” that pre-date SP 800-53.

Author(s)

Richard Kuhn (NIST)

Abstract

Keywords

computer security; PBX; private branch exchange; telecommunications security
Control Families

Access Control; Contingency Planning; Identification and Authentication; Maintenance; Media Protection; Physical and Environmental Protection; Risk Assessment;

Documentation

Publication:
SP 800-24 (DOI)
Local Download

Supplemental Material:
None available

Topics

Security and Privacy
general security & privacy

Technologies
communications & wireless