2. Verify that an intrusion prevention system (IPS) with deep packet inspection (DPI) is in place for organizations that are vulnerable to DDos attacks, such as financial institutions.
3. Review security procedures governing the administration of data encryption keys.
4. Verify the encryption process by transmitting a test message and examining the contents at various points along the channel between the sending and receiving locations.
5. Review the message transaction logs to verify that all messages were received in their proper sequence.
6. Test the operation of the call-back feature by placing an unauthorized call from outside the installation.