4.3 Ways a social engineering attack could take place