Which of the following defines when someone attempts to gain access to sensitive information of a top hospital executive through email?