ContentSocial engineering and other threats to internal securityAri TammamDecember 16, 2005How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?