Vulnerabilities of Telecommunications Systems to Unauthorized Use
LCD-77-102
Published: Mar 31, 1977. Publicly Released: Mar 31, 1977.
Skip to Highlights
Highlights
Telecommunications systems are vulnerable to various penetration techniques that may be used for gaining access to the system and intercepting and interpreting communications traffic carried over the system or inserting traffic into the system.
Full Report
Topics
Computer networksFacility securityRight of privacyElectronic data processingTelecommunicationsTelecommunications systemsDatabasesCommunicationsSoftwareComputers