Cyber Security Question

To prepare for this discussion, read the following articles:

In your discussion, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi organization. Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation

For this assignment, you are to:

  • include at least one source from professional or academic literature, cite at least one source
  • formatted to APA 7th edition
  • Avoid plagiarism