Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments