Social Engineering and IT Security Incident Response

User Generated

YNSYBS114

Computer Science

Description

As additional background, read the following two articles:

Alzahrani, A., & Khalid, R. (2016). Information security issues and threats in Saudi Arabia: A research survey. IJCSI International Journal of Computer Science Issues, 13(6).

Peters, S. (2015). The 7 best social engineering attacks ever. Retrieved from http://www.darkreading.com/the-7-best-social-engin...

In analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi company. Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation,

Your paper is required to be 5-6 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow academic writing standards and APA style guidelines, as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SOCIAL ENGINEERING AND IT SECURITY INCIDENT RESPONSE

Social Engineering and IT Security Incident Response
Student’s Name
Institutional Affiliation

1

SOCIAL ENGINEERING AND IT SECURITY INCIDENT RESPONSE

2

Social Engineering and IT Security Incident Response
Introduction
Social engineering is one of the oldest and most effective attack vectors that heavily
depend on the interaction of different people. It involves the manipulation of the targets into
breaking their standard security protocols as well as best practices to gain access to the physical
location, network or system for financial or other malicious reasons. Such an attack aims to get
past the existing security hurdles such as locked doors, password or processes by manipulating
the potential victim into sharing private information such as password, username and credit card
details. In so doing, the attacker gains access to the company and install malicious program on
the devices and network thereby compromising its information assets. With the number of
internet users rising drastically in Saudi Arabia, social media pretexting is one of the social
engineering attacks that hackers can use to target a Saudi company.
Social Engineering Attack: Social Media Pretexting
The Persian Gulf is one of the region in the world with the highest internet connection
and smartphone penetrating. Consequently, WhatsApp, Facebook, LinkedIn, Instagram and
Snapchat are increasingly becoming part of the day to day lives for most people. Nowhere is this
trend more pronounced than in Saudi Arabia. More than 35 % of the country’s population is
active on social media. On the other hand, Facebook and WhatsApp have penetration rates of
25% and 27% respectively (Alzahrani & Alomar, 2016). Furthermore, Saudi Arabia has the
highest number of Instagram and LinkedIn users in the region. In comparison to women, men
have a tendency of being more active on the identified social media platforms. According to the
data of Crowd Analyzer, people in mid-level senior management are some of the most active
users of social media because of their flexible working hours and ...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags