Describe how social engineering can be used to obtain physical access to a building or technological access to a network database containing classified information
300 words
BOOK: Curtis, G. & McBride, R. (2011). Proactive Security Administration, 2nd. Ed.; ISBN-
13: 9780135071502