Social engineering
Describe how social engineering can be used to obtain physical access to a building or technological access to a network database containing classified information BOOK: Curtis, G. & McBride, R. (2011). Proactive Security Administration, 2nd. Ed.; ISBN-13: 9780135071502