
Enhancing System Security
Physical Security
Administrator’s Guide for Avaya Communication Manager
323
November 2003
9
Monitor traffic and system activity for abnormal patterns
Activate features that “turn off” access in response to unauthorized access attempts.
Use Traffic and Call Detail reports to monitor call activity levels.
10
Educate system users to recognize toll fraud activity and react appropriately
From safely using calling cards to securing voice mailbox password, train your users on how to
protect themselves from inadvertent compromises to the system’s security.
11
Monitor access to the dial-up maintenance port. Change the access password regularly and issue it
only to authorized personnel. Consider activating Access Security Gateway. See
Access Security
Gateway
on page 1347.
12
Create a system-management policy concerning employee turnover and include these actions:
a
Delete any unused voice mailboxes in the voice mail system.
b
Immediately delete any voice mailboxes belonging to a terminated employee.
c
Immediately remove the authorization code if a terminated employee had screen calling
privileges and a personal authorization code.
d
Immediately change barrier codes and/or authorization codes shared by a terminated
employee. Notify the remaining users of the change.
e
Remove a terminated employee’s login ID if they had access to the system administration
interface. Change any associated passwords immediately.
13
Back up system files regularly to ensure a timely recovery. Schedule regular, off-site backups.
14
Callers misrepresenting themselves as the “phone company,” “AT&T,” “RBOCS,” or even known
employees within your company may claim to be testing the lines and ask to be transferred to
“900,” “90,” or ask the attendant to do “start 9 release.” This transfer reaches an outside operator,
allowing the unauthorized caller to place a long distance or international call. Instruct your users
to never transfer these calls. Do not assume that if “trunk to trunk transfer” is blocked this cannot
happen.
Hackers run random generator PC programs to detect dial tone. Then they revisit those lines to break
barrier codes and/or authorization codes to make fraudulent calls or resell their services. They do this
using your telephone lines to incur the cost of the call. Frequently these call/sell operations are conducted
at public payphones located in subways, shopping malls, or airport locations. See
QSIG to DCS TSC
Gateway
on page 1114 to prevent this happening to your company.
Physical Security
Physical security is your responsibility. Implement the following safeguards as an added layer of security:
1
Unplug and secure attendant console handsets when the attendant position is not in use.
2
Lock wiring closets and media server rooms.
3
Keep a log book register of technicians and visitors.
4
Shred all Communication Manager information or directories you discard.
5
Always demand verification of a technician or visitor by asking for a valid I.D. badge.
6
Keep any reports that may reveal trunk access codes, screen barrier codes, authorization codes, or
password information secure.