<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Guidelines on a Mobile Security Lab Course</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">35-44</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The present article, based on an assortment of previous publications and presentations by the author, shows how to prepare and implement an array of security demonstrations in mobile phones. The proposed demonstrations focus on security issues and shortcomings that affect mobile phones’ confidentiality, integrity and availability. The resulting overview can be used as guidance, in the framework of a summer school laboratory course and in order to raise awareness among users.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">99-120</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems.
This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">99</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">PBX Security and Forensics: A Practical Approach</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">7</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">89-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Private Branch Exchanges (PBXs) are privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the Public Switched Telephone Network (PSTN) or other communication networks. Even if the core public network is operating normally, unintentional or targeted damages and attacks in PBXs can cause significant instability and problems. Furthermore, interception of calls is a very sensitive issue that affects all of us. In that sense, it is not an exaggeration to state that PBXs are part of a nation’s critical infrastructure. Much has been said and done regarding data communication security but PBXs have been left unprotected, forgotten and waiting to be attacked. This contribution outlines a targeted, centralized project in order to both educate the users and secure their telephony systems. It compromises of educational, policy, auditing, technical, documentation, hardware and software solutions and actions that could be implemented under a joint project.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cybercrime in Fixed Telephony Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Seminar 62/2011, High Tech &amp; Cyber Crime</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 20, 2011</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">European Police College (CEPOL)</style></publisher><pub-location><style face="normal" font="default" size="100%">Brdo near Kranj, Slovenia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Detecting Cybercrime in Modern Telecommunication Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Seminar 64/2010, Cyber Crime &amp; High Tech</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 18-21, 2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">European Police College (CEPOL)</style></publisher><pub-location><style face="normal" font="default" size="100%">Athens</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iosif Androulidakis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">PBX security</style></title><secondary-title><style face="normal" font="default" size="100%">2nd Pan-Hellenic Conference on Electronic Crime</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><pub-location><style face="normal" font="default" size="100%">Athens</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>