Chapter 14

Creating Hardened Policies and Procedures

Andrew Mason,    Technical Director, RandomStorm Limited

This initial chapter in the defensive strategies section will look at how the reader can harden their policies and procedures as a way of protecting against a possible social engineering attack. Various methods and recommendations will be provided to assist the reader to identify policy weaknesses and make the required changes to avert a potential issue.

Keywords

Outer layer protection; inner layer protection; industry information security; cyber security standards; social engineering policies and procedures; password guidance

Information in this chapter

• Background

• Outer layer protection

• Inner layer protection

• Social engineering defense: ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.