Do an analysis of Jason's actions and log all social engineering actions. How could each particular action have been prevented?
ARTICLE: http://resources.infosecinstitute.com/social-engineering-a-case-study/
ARTICLE: https://www.7elements.co.uk/about-us/case-studies/social-engineering-drive-by-download-attack/
ARTICLE: https://www.bankinfosecurity.com/case-study-one-small-institution-fights-back-big-time-against-social-a-681