header bg

Scan QR code or get instant email to install app


What influence principle was in use if Joe is studying a recent social engineering attack that occurred against his organization and the attacker phoned an administrative assistant and said that her files were being deleted and that he needed the assistant’s password to stop the loss of data?

A Urgency

Related Information