Administrator's Guide

Enhancing system security
555-233-506380 Issue 5 October 2002
7. Protect access to information stored as voice
Password restrict access to voice mail mailboxes.
Use non-trivial passwords and change passwords regularly.
8. Provide physical security for telecommunications assets
Restrict unauthorized access to equipment rooms and wire connection
closets.
Protect system documentation and reports data from being compromised.
9. Monitor traffic and system activity for abnormal patterns
Activate features that turn off access in response to unauthorized access
attempts.
Use Traffic and Call Detail reports to monitor call activity levels.
10. Educate system users to recognize toll fraud activity and react
appropriately
From safely using calling cards to securing voice mailbox password, train
your users on how to protect themselves from inadvertent compromises to
the systems security.
11. Monitor access to the dial-up maintenance port. Change the access
password regularly and issue it only to authorized personnel. Consider
activating Access Security Gateway.
12. Create a switch system management policy concerning employee turnover
and include these actions:
a. Delete any unused voice mailboxes in the voice mail system.
b. Immediately delete any voice mailboxes belonging to a terminated
employee.
c. Immediately remove the authorization code if a terminated
employee had screen calling privileges and a personal authorization
code.
d. Immediately change barrier codes and/or authorization codes shared
by a terminated employee. Notify the remaining users of the change.
e. Remove a terminated employees login ID if they had access to the
system administration interface. Change any associated passwords
immediately.
13. Back up system files regularly to ensure a timely recovery. Schedule
regular, off-site backups.