Description
As additional background, read the following two articles:
http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411
https://www.ijcsi.org/papers/IJCSI-13-6-129-135.pdf
In a written analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi company. Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation.
Your paper should be 1-2 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.
Explanation & Answer
Attached.
Running head: SOCIAL ENGINEERING AND SECURITY INCIDENT RESPONSE
Social Engineering and Security Incident Response
Institution Affiliation
Date
1
SOCIAL ENGINEERING AND SECURITY INCIDENT RESPONSE
2
According to Conheady & Leverett (2014), social engineering is something used by
many people with bad motives to gain trust and confidence in them and by so doing get to give
very confidential information which in return threatens the security of information. In Saudi
Arabia, the use of internet has grown because users of the internet have increased largely.
Security threats in use of the internet have become an issue because most people are not aware
that their social accounts are not safe.
Cyber-attacks are one of the experiments one can carry out to perform a social
engineering attack on a Saudi company. This is due to rise in use of digita...