7.7. Performing Social Engineering Attacks Verbal Notes | IT Ethics and Cybersecurity BIM | TU | TABFlux