PBX Design Over Integrated Services Digital Network Interface

Main Article Content

Pardeep Kumar
Shiv Kumar Gupta


In the presents of our view we intended for use primarily by system administrators of PBX systems, but may also be useful for security
evaluators. Where possible, countermeasures are described that can be applied by system administrators. In some cases vulnerabilities may be
discovered that require software patches from the manufacturer. We will look at the ISDN system architecture and saw the key role played by
the PBX and also will take a closer look at this device to get an idea of how it works internally. PBX design is a large and complex area, and
much of the technology is proprietary



Keywords: PBX, Threats, CCITT, POTS.


Download data is not yet available.

Article Details