Social Engineering Policy: Identity Verification

Being aware of how attackers use pretexting to gather information, you need to write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information.Part A:Using ONLY your readings for this week as well as the videos and supplemental reading on how attackers use pretexting to gather personal information, what specific items do you think should be considered in writing a policy for identity verification?Part B:Write a policy describing the procedures your fictitious company will use to verify the identity of those requesting information.  Be sure to include all the various means of communication within your company: in-person, via telephone, and via e-mail.  Do not forget that the policy should take into consideration the unique features of your scenario as well as your answers to Part A.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support