The attacker will exploit human weakness by using authority, maintaining a high level of pressure or the sense of urgency, for example, to achieve his ends. It is usually the main vector of attack.
NTA (Network Traffic Analysis)
An NTA appliance can analyze traffic in order to find unusual activities and attacks....