O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Creating Hardened Policies and Procedures

Andrew Mason,    Technical Director, RandomStorm Limited

This initial chapter in the defensive strategies section will look at how the reader can harden their policies and procedures as a way of protecting against a possible social engineering attack. Various methods and recommendations will be provided to assist the reader to identify policy weaknesses and make the required changes to avert a potential issue.

Keywords

Outer layer protection; inner layer protection; industry information security; cyber security standards; social engineering policies and procedures; password guidance

Information in this chapter

• Background

• Outer layer protection

• Inner layer protection

• Social engineering defense: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required