Return to Article Details Social Engineering Attack: Understanding Human Vulnerability in Cybersecurity Download Download PDF