Being aware of how attackers use pretexting to gather information,

 

Being aware of how attackers use pretexting to gather information, you need to write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information. 

Part A:

Using ONLY your readings for this week as well as the videos and supplemental reading on how attackers use pretexting to gather personal information, what specific items do you think should be considered in writing a policy for identity verification?  

Part B:

Write a policy describing the procedures your fictitious company will use to verify the identity of those requesting information.  Be sure to include all the various means of communication within your company: in-person, via telephone, and via e-mail.  Do not forget that the policy should take into consideration the unique features of your scenario as well as your answers to Part A. 

Table of Contents

Calculate your order
Pages (275 words)
Standard price: $0.00

Latest Reviews

Impressed with the sample above? Wait there is more

Related Questions

Determinism

 According to the principle of determinism, every event that takes place in the world has a cause. Whether or not the event is snow falling,

New questions

Don't Let Questions or Concerns Hold You Back - Make a Free Inquiry Now!