This document outlines an assignment to analyze social engineering attacks and IT security incident responses. Students are asked to choose a social engineering experiment they could perform on a Saudi company, discuss the methods and weaknesses they would exploit in employees or their family members to gain access or control, and provide recommendations to protect against such exploitation. The paper must be 4-5 pages not including references, cite one additional scholarly source, and follow academic writing standards.