Conversation

Replying to
persuade, influence and convince another person that you are someone that you aren't in order to gain their trust to gain access to normally restricted systems / areas / etc. Any company or organization can fall victim to these type of attacks.
1
2