Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control.

Cyber Security

To prepare for this discussion, read the following articles:

Information Security Issues and Threats in Saudi Arabia: A Research Survey.

Phishing by Industry Benchmarking report.

In your discussion, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi organization.

Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation

For this assignment, you are to:

include at least one source from professional or academic literature, cite at least one source

formatted to APA 7th edition

Avoid plagiarism

Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control.
Scroll to top