Creating Hardened Policies and Procedures
Andrew Mason, Technical Director, RandomStorm Limited
This initial chapter in the defensive strategies section will look at how the reader can harden their policies and procedures as a way of protecting against a possible social engineering attack. Various methods and recommendations will be provided to assist the reader to identify policy weaknesses and make the required changes to avert a potential issue.
Keywords
Outer layer protection; inner layer protection; industry information security; cyber security standards; social engineering policies and procedures; password guidance
Information in this chapter
• Background
• Outer layer protection
• Inner layer protection
• Social engineering defense: ...
Get Social Engineering Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.