This document discusses securing Asterisk PBX systems and outlines typical threats such as call stealing and server intrusion. It describes how attackers can scan for PBX servers, find extensions, and crack passwords to steal calls via SIP/IAX2. The document then provides recommendations for protecting PBX servers, including using SSH key authentication, separating voice and data networks, restricting HTTP access, and using strong unique passwords. It also recommends fail2ban and Snort for intrusion detection and prevention.