All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Discuss how you would evaluate the effectiveness of the Social Engineering policy addressed below in terms of achieving its objectives.

Social engineering is an illegal act of penetrating systems through manipulation. The perpetrators use all means of manipulation to exploit the weaknesses of others. The manipulation gives them access to the private information of the victims, which can be used in gaining access to protected systems. Greavu-Serban & Serban (2014) define social engineering as the use of social skills to obtain private information like passwords, credit card details, and usernames that allow access to protected systems. An agency like International Atomic Energy Agency (IAEA) requires various security policies to protect them from social engineering. IAEA, like most organizations, faces the threat of social engineering, which has been on the increase.

The threat of social engineering keeps on increasing daily. The increase of employees working from home has magnified the threat with increased security policies required to protect the employees and the organization. At IAEA, a policy on training and education can be implemented to protect the organization and the employees. The policy will ensure training and education for all the employees at IAEA. Training and education ensure all the employees receive cybersecurity awareness training (Alharthi & Regan, 2021). The training and education will ensure the employees learn all the types of social engineering attacks like phishing, vishing and smishing, tailgating, and piggybacking. All the employees, including the top executives and managers, should participate in the training. The policy will give the employees a chance to understand how they can contribute towards information security at the organization. It also helps them protect themselves against social engineering.

References

Alharthi, Dalal & Regan, Amelia. (2021). Social Engineering InfoSec Policies. 10.5121/csit.2021.110104.

Greavu-Serban, Valerică & Şerban, Oana. (2014). Social Engineering A General Approach. Informatica Economică. 18. 5-14. 10.12948/issn14531305/18.2.2014.01.

All posts must be at least 250 words long. This is an APA reference. Work that is entirely original. Plagiarism is not tolerated.

Discuss how you would assess the efficiency of the below-mentioned Social Engineering policy in terms of attaining its goals.

The criminal act of entering systems through manipulation is known as social engineering. The criminals utilize every trick in the book to take advantage of other people’s flaws. The manipulation allows them access to the victims’ personal information, which they can use to obtain access to secure systems. Social engineering, according to Greavu-Serban and Serban (2014), is the use of social skills to get private information such as passwords, credit card numbers, and usernames that allow access to secured networks. To secure an organization like the International Atomic Energy Agency (IAEA), numerous security rules are required.

Published by
Essays
View all posts