PowerPoint Slideshow about 'Social Engineering' - happy
Download NowAn Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim. – www.wikipedia.org
As a service provider, Duo Consulting helps clients manage the publication of critical business information on their web sites.
Integrity and availability are important considerations for Duo when processing requests for changes
Duo understands the need to assemble a team to address the development of the policy through the different stages
Planning: the team must establish the strategy, initial approximation of the effort, plan for releases for delivery, perform a preliminary risk assessment, develop policy organization, and establish leadership.
Design: the team ensures that the policy is meeting the goals and that it serves the intended goal. Feasibility is addressed here, as well as estimates of implementation (time and effort)
Implementation: the team must ensure the policy is tested and approved. The team ensures management approval, and re-assesses risk
Test: all aspects of the policy must be tested, including process, sign-offs, technology, etc
Rollout: the team ensures prior to rollout that all training and legal aspects are covered
Operate: periodically review the policy to ensure its enforceability and effectiveness