Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Enhancing system security
309Physical security
11
conducted at public payphones located in subways, shopping malls, or
airport locations. Refer to ‘‘
Remote Access’’ on page 857 to prevent this
happening to your company.
Physical security
Physical security is your responsibility. Implement the following safeguards as an
added layer of security:
1. Unplug and secure attendant console handsets when the attendant position
is not in use.
2. Lock wiring closets and switch rooms.
3. Keep a log book register of technicians and visitors.
4. Shred all switch information or directories you discard.
5. Always demand verification of a technician or visitor by asking for a valid
I.D. badge.
6. Keep any reports that may reveal trunk access codes, screen barrier codes,
authorization codes, or password information secure.
7. Keep the attendant console and supporting documentation in an office that
is secured with a changeable combination lock. Provide the combination
only to those individuals who need to enter the office.
8. Keep any documentation pertaining to switch operation secure.
9. Label all backup tapes or flash cards with correct dates to avoid using an
outdated one when restoring data. Be sure that all backup media have the
correct generic software load.
System security checklist
Here’s some of the steps required for indemnification. Use these to analyze your
system security.
1. Remove all default factory logins of
cust, rcust, browse, nms, and bcms
and assign unique logins with 7-character alphanumeric passwords and a
90-day password aging. Use the
list logins command to find out what
logins are there.
2. If you do not use Remote Access, be sure to disable it permanently.
Tip:
You can use the
display remote-access
command to check the status
of your remote access.