As additional background, read the attached articles:
● Information Security Issues and Threats in Saudi Arabia: A Research Survey.
● Phishing by Industry Benchmarking report.
In your analysis, highlight and share an experiment that you might utilize to perform a social engineering attack
on a Saudi organization. Discuss what methods and weaknesses you would use to exploit the employees to try
and gain positive access and/or control. Include any additional recommendations to the company/employees to
protect against such exploitation.
Your paper is required to be 4-5 pages in length, not including the title and reference pages, and should cite at
least three scholarly resources from well-known journals such as IEEE, Springer, etc. It should follow University
academic writing standards and APA style guidelines, as appropriate.