For your selected target organization perform research and examine physical security of your target and social engineering tactics you might use against your target. Identify important vulnerabilities for physical security and social engineering. Create a document in which you summarize in 1-3 sentence your findings. Then for each vulnerability you identify, name it, provide a description, provide information on how this vulnerability can be exploited, and describe what could happen (consequences) if an attacker exploited this vulnerability. Consider the following attributes as you assess the seriousness of each vulnerability, and rate each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating. Confidentiality: (can attacker access information that should not be disclosed, and if so, how much?) Integrity: (can attacker modify system files or information, and if so, how much?) Availability: (can an attacker reduce performance of system or interrupt availability of this resource, and if so, how much?) Access Complexity (how skilled does an attacker need to be, or how much special access would they need, in order to exploit this vulnerability.