PBX Design Over Integrated Services Digital Network Interface
Abstract
In the presents of our view we intended for use primarily by system administrators of PBX systems, but may also be useful for security
evaluators. Where possible, countermeasures are described that can be applied by system administrators. In some cases vulnerabilities may be
discovered that require software patches from the manufacturer. We will look at the ISDN system architecture and saw the key role played by
the PBX and also will take a closer look at this device to get an idea of how it works internally. PBX design is a large and complex area, and
much of the technology is proprietary
Keywords: PBX, Threats, CCITT, POTS.
Full Text:
PDFDOI: https://doi.org/10.26483/ijarcs.v2i2.435
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Advanced Research in Computer Science

