Question 1
As additional background, read the following two articles:
Alzahrani, A., & Khalid, R. (2016). Information security issues and threats in Saudi Arabia: A research survey. IJCSI International Journal of Computer Science Issues, 13(6).
Peters, S. (2015). The 7 best social engineering attacks ever.
In analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi company. Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation,
Your paper is required to be 4-5 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow academic writing standards and APA style guidelines, as appropriate.
Question 2
Use Sage to completely implement ARS 256 Block size and 3 different keys 128, 192 and 256 bits. Take your implementation and encrypt Plaintext of “Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage”
Your key is “Cryptography”
What are the effect of such key on the ciphertext?