An email social engineering attack
|“||involves prompting the user to open an attachment or follow an unsolicited link. When the file or link is opened, the system becomes directly infected with malware or is subjected to exploits attempting to install malware.||”|
"Social engineering attacks rely on the interaction between an attacker and an employee interaction that often takes advantage of an employee's willingness to assist a seemingly harmless individual — to gain access to important agency information assets."
- ↑ Botnets as a Vehicle for Online Crime, at 5.
- ↑ Id.
- ↑ A Best Practices Guide to Information Security, at 21 n.7.