Telecom fraud: The cost of doing nothing just went up

نویسنده

  • C. Pollard
چکیده

Craig Pollard, head of project management at Siemens Communications examines the increasing threat of telephony fraud and highlights the vulnerabilities to IT managers. a 2005 Elsevier Ltd. All rights reserved. It is probably little surprise that telephony fraud has become big business. However, with the International Forum of Irregular Network Access estimating that the total cost of telephony fraud worldwide has grown to £40 billion, it is clear that more needs to be done to tackle the issue. Indeed, techniques adopted by hackers have become significantly more sophisticated. Traditional PBX systems are being targeted internally by unscrupulous employees and externally by organised crime gangs, both of whom are intent on using voice communications for fraudulent activities. The threat of telephony fraud Organisations must therefore remain vigilant to a variety of criminal practices or they will continue to count the costs. Some examples of such practices include PBX hacking, abuse of corporate call forwarding and the courier scam. 0167-4048/$ see front matter a 2005 Elsevier Ltd. All rights rese doi:10.1016/j.cose.2005.07.006 PBX hacking Fraudsters can break into a traditional PBX if the switch is not properly configured and password usage is not effectively monitored. Should a hacker compromise the PIN and password number on a PBX, they can break into a company’s telephone system and make anonymous and free telephone calls. By simply raiding an organisation’s bins, a criminal could potentially locate confidential information not properly disposed of and assume the identity of a trusted employee. Once they have assumed a false identity, fraudsters could access a company’s online directory and gain access to other individuals’ PIN numbers by posing as maintenance workers. The maintenance port of a PBX is an area of frequent fraudulent exploitation. Hackers often use the dial-up modem attached to such ports, used to assist remote maintenance activities, to gain access to the network. When a PBX is linked to an organisation’s IT network e as is increasingly

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services

Telecom providers are losing tremendous amounts of money due to fraud risks posed to Telecom services and products. Currently, they are mainly focusing on fraud detection approaches to reduce the impact of fraud risks against their services. However, fraud prevention approaches should also be investigated in order to further reduce fraud risks and improve the revenue of Telecom providers. Fraud...

متن کامل

Credit Card Fraud Detection using Data mining and Statistical Methods

Due to today’s advancement in technology and businesses, fraud detection has become a critical component of financial transactions. Considering vast amounts of data in large datasets, it becomes more difficult to detect fraud transactions manually. In this research, we propose a combined method using both data mining and statistical tasks, utilizing feature selection, resampling and cost-...

متن کامل

Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection

Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...

متن کامل

Designing an expert system for fraud detection in private telecommunications networks

Telecommunications fraud not only burdens telecom provider’s accountings but burdens individual users as well. The latter are particularly affected in the case of superimposed fraud where the fraudster uses a legitimate user’s account in parallel with the user. These cases are usually identified after user complaints for excess billing. However, inside the network of a large firm or organizatio...

متن کامل

Principles of Preventing Fraud in Business from the Ethics Perspective

Background: The basics of preventing fraud in business are the commonalities of the two systems of ethics and law. The basics of this rule indicate the non-prescription and prevention of fraud. The principles at stake are for the protection of individuals' interests and property security, and even for the maintenance of order in society, and those who seek to exploit fraud for the greater benef...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2005