Phreakers: Individuals who engage in the unauthorized access of telecommunication systems, such as telephone networks or voicemail systems. They may use special equipment or software to bypass security measures and gain access to restricted information or services. It is used in the field of information security to identify and prevent potential security breaches in telecommunications systems. 3 examples of phreaking activities are hacking into voicemail systems, making free long-distance calls, and accessing restricted phone numbers.
Categories: CC D5: Security Operations | CCSP D4: Cloud Application Security | CISM D3: Information Security Program | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D7: Systems and Application Security
« Back to Glossary Index