Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1



Similar documents
Domain 1 Components of the Cisco Unified Communications Architecture

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

Domain 1 - Describe Cisco VoIP Implementations

Consider these sobering statistics

NBX Business Telephone Guide

June 3, Voice over IP

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

CHAPTER 3 THE TIME VALUE OF MONEY

Domain 1: Configuring Domain Name System (DNS) for Active Directory

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Engineering Data Management

! encor e networks TM

Domain 1: Designing a SQL Server Instance and a Database Solution

BaanERP. BaanERP Windows Client Installation Guide

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

Baan Service Master Data Management

INVESTMENT PERFORMANCE COUNCIL (IPC)

Skytron Asset Manager

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

Anti-Money Laundering

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

Wells Fargo Insurance Services Claim Consulting Capabilities

Agency Relationship Optimizer

ODBC. Getting Started With Sage Timberline Office ODBC

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

The future of global data management is here: modular, scalable and integrated. MasterCard smartdata.gen2

Modified Line Search Method for Global Optimization

CHAPTER 3 DIGITAL CODING OF SIGNALS

HCL Dynamic Spiking Protocol

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

Configuring Additional Active Directory Server Roles

Statement of cash flows

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

Convention Paper 6764

Performance Attribution in Private Equity

Handling. Collection Calls

Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated.

Amendments to employer debt Regulations

Soving Recurrence Relations

How to read A Mutual Fund shareholder report

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

Your organization has a Class B IP address of Before you implement subnetting, the Network ID and Host ID are divided as follows:

Forecasting. Forecasting Application. Practical Forecasting. Chapter 7 OVERVIEW KEY CONCEPTS. Chapter 7. Chapter 7

Confidence Intervals for One Mean

client communication

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions

Serial ATA PCI Host Adapter AEC-6290/6295

Lecture 2: Karger s Min Cut Algorithm

Baan Finance Accounts Payable

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand

1 Correlation and Regression Analysis

Basic Elements of Arithmetic Sequences and Series

A guide to School Employees' Well-Being

Equalizer Installation and Administration Guide

CCH Accountants Starter Pack

Quadrat Sampling in Population Ecology

Learning objectives. Duc K. Nguyen - Corporate Finance 21/10/2014

Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

facing today s challenges As an accountancy practice, managing relationships with our clients has to be at the heart of everything we do.

Chapter XIV: Fundamentals of Probability and Statistics *

CHAPTER 3 The Simple Surface Area Measurement Module

5 Boolean Decision Trees (February 11)

The Stable Marriage Problem

(VCP-310)

Pre-Suit Collection Strategies

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Planning for Your Hip Replacement Surgery

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

PowerView. Model AP9215. User s Manual

Determining the sample size

CCH Document Management

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

BaanERP 5.0c. EDI User Guide

Packages: Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y

Department of Computer Science, University of Otago

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

Output Analysis (2, Chapters 10 &11 Law)

Did you know that houses with CCTV are 90% less likely to be burgled? Yale now offer a range of Easy Fit CCTV systems

Incremental calculation of weighted mean and variance

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD

WindWise Education. 2 nd. T ransforming the Energy of Wind into Powerful Minds. editi. A Curriculum for Grades 6 12

Ethernet Option Board

Lesson 15 ANOVA (analysis of variance)

PUBLIC RELATIONS PROJECT 2016

How To Write A Privacy Policy For A Busiess

Transcription:

Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2

Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig (or SMDR) With Call Detail Recordig (CDR) activated for the icomig truk groups, you ca fid out details about the calls made ito your voice mail ports. This feature is kow as Statio Message Detail Recordig (SMDR) o some switches icludig MERLIN LEGEND. NOTE: Lucet s optioal Call Accoutig System (CAS) may be istalled o the Lucet system, allowig you to create customized reports with your G1, G3, or Ituity MERLIN LEGEND CDR/SMDR data. The optioal Lucet HackerTracker program works i cojuctio with CAS Plus Versio 3 to alert you to abormal callig activities. NOTE: Review the CDR data for the followig symptoms of voice messagig abuse: Short holdig times o ay truk group where voice messagig is the origiatig edpoit or termiatig edpoit Calls to iteratioal locatios ot ormally used by your busiess Calls to suspicious destiatios Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 2 Issue 2

Detectig Voice Mail Fraud Numerous calls to the same umber Udefied accout codes NOTE: For G2 ad System 85, sice CDR oly records the last extesio o the call, iteral toll abusers trasfer uauthorized calls to aother extesio before they discoect so the CDR does ot track the origiatig statio. If the trasfer is to your voice messagig system, it could give a false idicatio that your voice messagig system is the source of the toll fraud. Call Traffic Report This report provides hourly port usage data ad couts the umber of calls origiated by each port. By trackig ormal traffic patters, you ca respod quickly if a uusually high volume of calls begis to appear, especially after busiess hours or durig weekeds, which might idicate hacker activity. For G1, G3, ad System 75, traffic data reports are maitaied for the last hour ad the peak hour. For G2 ad System 85, traffic data is available via Moitor I, which ca store the data ad aalyze it over specified periods. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 3 Issue 2

Truk Group Report Detectig Voice Mail Fraud This report tracks call traffic o truk groups at hourly itervals. Sice truk traffic is fairly predictable, you ca easily establish over time what is ormal usage for each truk group. Use this report to watch for abormal traffic patters, such as uusually high off-hour loadig. SAT, Maager I, ad G3-MT Reportig Traffic reportig capabilities are built-i ad are obtaied through the System Admiistrator Tool (SAT), Maager I, ad G3-MT termials. These programs track ad record the usage of hardware ad software features. The measuremets iclude peg couts (umber of times ports are accessed) ad call duratio. Traffic measuremets are maitaied costatly ad are available o demad. However, reports are ot archived ad should therefore be prited to moitor a history of traffic patters. ARS Measuremet Selectio The ARS Measuremet Selectio ca moitor up to 20 routig patters (25 for G3) for traffic flow ad usage. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 4 Issue 2

Automatic Circuit Assurace Detectig Voice Mail Fraud This moitorig techique detects a umber of short-holdig-time calls or a sigle logholdig-time call which may idicate hacker activity. Log holdig times o truk-to-truk calls ca be a warig sig. The ACA feature allows you to set time limit thresholds defiig what is cosidered a short holdig time ad a log holdig time. Whe a violatio occurs, a desigated statio is visually otified. Whe a alarm occurs, determie if the call is still active. If toll fraud is suspected (for example, a log-holdig-time alarm occurs o a truk-to-truk call), you may wat to use the Busy Verificatio feature to moitor the call i progress. Busy Verificatio Whe toll fraud is suspected, you ca iterrupt the call o a specified truk group ad moitor the call i progress. Callers will hear a log toe to idicate the call is beig moitored. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 5 Issue 2

AUDIX Traffic Reports Detectig Voice Mail Fraud The Ituity AUDIX system tracks traffic data over various time spas. Reviewig these reports o a regular basis helps to establish traffic treds. If icreased activity or uusual usage patters occur, such as heavy call volume o ports assiged to outcallig, they ca be ivestigated immediately. I additio, the AUDIX Admiistratio ad Data Acquisitio Package (ADAP) uses a PC to provide exteded storage ad aalysis capabilities for the traffic data. You ca also use the AUDIX Admiistratio Log ad Activity Log to moitor usage ad ivestigate possible break-i attempts. For more iformatio o ruig ad usig reports, see AUDIX Traffic Reports. Procedure completed. Detectig Voice Mail Fraud - 6 Issue 2