Description
As additional background, read the following two articles:
Alzahrani, A., & Khalid, R. (2016). Information security issues and threats in Saudi Arabia: A research survey. IJCSI International Journal of Computer Science Issues, 13(6).
Peters, S. (2015). The 7 best social engineering attacks ever. Retrieved from http://www.darkreading.com/the-7-best-social-engin...
In analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi company. Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation,
Your paper is required to be 4-5 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow University academic writing standards and APA style guidelines, as appropriate.
Explanation & Answer
Attached.
Running Head: SOCIAL ENGINEERING & IT SECURITY INCIDENT RESPONSE
Social Engineering & IT Security Incident Response
Name
Course
Tutor
Date
1
SOCIAL ENGINEERING & IT SECURITY INCIDENT RESPONSE
2
To make it possible to access the information from a Saudi Company, a social engineering
attack would need to be launched against the company. The social engineering attack should be
best accessed in a way that cannot be easily expected by the company. The company that makes
the most sense in attacking it is one that deals in oil, given the fact that Saudi Arabia engages a
lot in the production of oil. In this regard, electronic communications, and devices will need to
be taken into consideration given the growth in the use of technological devices in everyday use
in Saudi Arabia. It is easiest to target that which a company puts into its greatest use. It will need
computers to store company data on the oil production, the sources of oil, the numbers as the oil
production progresses, the biggest clients, and the research conducted on the oil production
increase (Peters, 2015).
Application of phishing attempts would work best in such a scenario. The most important
department in the company to target would be the research, and development department; the
accounts, and finance department; the marketing department; and the production department. All
these departments have important information regarding the company, and its production
activities. An email can be sent out to each of these departments (Peters, 2015). This means that
the person sending it out has to have the email addresses of these departments...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
You Are a Badass
by Jen Sincero
Unf*ck Yourself
by Gary John Bishop
Alice in Wonderland
by Lewis Carroll
East of Eden
by John Steinback
A Wrinkle as Time
by Madeleine L'Engle
Big Magic
by Elizabeth Gilbert
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
The Prince
by Niccolò Machiavelli