Ad-hoc Technological attack Sample Clauses
Ad-hoc Technological attack. The SE attack aims to deceive users making them to perform a risky behaviour, then enabling the execution of a technological attack. This behaviour could be, for example, to visit and/or insert credentials in a fraudulent website (see section 3.4.3), or to install Trojan software (see section 3.4.2). In most part of the cases, a technological follow-up is necessary to allow the attacker gain a privileged access inside the company network, this can leverage a well-known or 0- day vulnerability, depending on the company targeted.
