Return to Article Details The analysis of social engineering methods in attacks on authentication systems Download Download PDF