U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cutting Off Hackers' Connections

NCJ Number
174453
Journal
Security Management Volume: 41 Issue: 4 Dated: April 1997 Pages: 73-81
Author(s)
H Becker
Date Published
1997
Length
9 pages
Annotation
This article discusses how security managers can better protect a company's flow of information by understanding the technologies at work in a corporate telecommunications system.
Abstract
The separate components of a company's telecommunications system, and any service provider that works with them, all pose distinct security risks. Specialized solutions should be designed to ensure the security of: (1) the private branch exchange, a telephone switching mechanism that connects a company's telephones and modems to the public telephone network; (2) an integrated switched digital network, very small aperture terminal or frame relay, which carry data communications; (3) procedures that involve human operators; and (4) modems. The article describes specific security risks connected with individual components, and suggests procedures to minimize the risks. In addition to protecting company information with technological improvements, ancillary solutions such as data encryption and constant transmission monitoring can help ensure data integrity.