Preventing Toll Fraud

This chapter covers the following topics:

  • Explaining how legitimate devices can be exploited for fraudulent use of the IP PBX system to make toll calls
  • Using partitions and calling search spaces, restricting call forwarding based on user classes, and restricting voice-mail transfers to internal destinations
  • Explaining the usage of blocking commonly exploited area codes
  • Configuring Cisco CallManager to route calls to different locations based on the time of day when a call is made
  • Designing and implementing FAC to require user authorization for different classes of calls
  • Providing external call transfer blocking by setting service parameters and configuring gateways, trunks, and route patterns as OffNet devices
  • Configuring Cisco CallManager Administration to drop a conference call when the conference creator leaves the call or when the last OnNet party leaves

Business consumers have more control over their telecommunications services than ever before. New technologies provide more information and more flexibility in how businesses use their telecommunications services. Unfortunately, the shift in control has made businesses and telephone companies more susceptible to toll fraud and led to an increase in fraud. This chapter discusses ways to prevent toll fraud in a company.

Toll Fraud Exploits

Категории