internship ppt on smartinternz platform as salesforce developer
Social Engineering and IT Security Incident Response.docx
1. Social Engineering and IT Security Incident Response
Description Social Engineering and IT Security Incident Response (65 points) As additional
background, read the following two articles: Alzahrani, A., & Khalid, R. (2016). Information
security issues and threats in Saudi Arabia: A research survey. IJCSI International Journal of
Computer Science Issues, 13(6). Peters, S. (2015). The 7 best social engineering attacks
ever. Retrieved from http://www.darkreading.com/the-7-best-social-engineering-attacks-
ever/d/d-id/1319411 In analysis, highlight and share an experiment that you might utilize
to perform a social engineering attack on a Saudi company. Discuss what methods and
weaknesses you would use to exploit the employees or family members of employees to try
and gain positive access and/or control. Include any additional recommendations to the
company/employees to protect against such exploitation, Your paper is required to be 4-5
pages in length, not including the title and references pages, and should cite at least one
scholarly resource other than the course materials. It should follow Saudi Electronic
University academic writing standards and APA style guidelines, as appropriate.