Within the context of Computer Security, which of the following statements describes Social Engineering best?