... is used to later compromise networks. Usually, software tools, such as sniffers and scanners, are used to map out network resources and exploit potential weaknesses in the targeted networks, ... make calls to employees to gather password information. Other examples of social engineering include bribing a coworker to gain access to a server or searching a colleague’s office to find a password ... effects of a network attack. An attack may directly cause several hours of downtime for employees, and networks must be taken down in order for damage to be repaired or data to be restored. Clearly,...