Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control.

To prepare for this discussion, read the following articles:

Information Security Issues and Threats in Saudi Arabia: A Research Survey.

Phishing by Industry Benchmarking report.

In your discussion, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi organization.

Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control.

Include any additional recommendations to the company/employees to protect against such exploitation