Cyber Security To prepare for this discussion, read the following articles: Information Security Issues and Threats in Saudi Arabia: A Research Survey. Phishing by Industry Benchmarking report. In your discussion, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi organization. Discuss what methods and weaknesses you […]