witting5…

Social Engineering As additional background, read the following articles: Information Security Issues and Threats in Saudi Arabia: A Research Survey. Phishing by Industry Benchmarking report. In your analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on an organization. Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation. Your paper is required to be 6 pages in length, not including the title and reference pages, and should cite at least one scholarly resource other than the course materials. It should follow APA style guidelines, as appropriate.