{"title":"G-core hackers a clear and present danger","authors":"R. Bhattacharyya, H. Kluepfel","doi":"10.1109/CCST.1992.253770","DOIUrl":null,"url":null,"abstract":"The authors address the increase in security risks that telecommunications carriers and service providers have been experiencing. They present, in general terms, the methods that are used by intruders to gain unauthorized access to telephone company resources. An excerpt from a hacker's bulletin board illustrates several types of damage that an intruder can inflict. The reasons for this increased vulnerability are briefly described. A holistic approach to reduce the security risk is recommended which includes a consolidated effort to establish and implement various guidelines in areas such as user awareness, physical security, and security of all the components. Several desirable security features of these components are listed to provide quick reference for managers, administrators, and auditors with security related responsibilities. These features are expected to migrate into international baseline security standards to counter the threats described.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253770","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The authors address the increase in security risks that telecommunications carriers and service providers have been experiencing. They present, in general terms, the methods that are used by intruders to gain unauthorized access to telephone company resources. An excerpt from a hacker's bulletin board illustrates several types of damage that an intruder can inflict. The reasons for this increased vulnerability are briefly described. A holistic approach to reduce the security risk is recommended which includes a consolidated effort to establish and implement various guidelines in areas such as user awareness, physical security, and security of all the components. Several desirable security features of these components are listed to provide quick reference for managers, administrators, and auditors with security related responsibilities. These features are expected to migrate into international baseline security standards to counter the threats described.<>