Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?
Grayware installation
Worm transmission
Malware installation
Human interaction
Security | |
Operating Systems | |
Software Troubleshooting | |
Operational Procedures |