Describe some of examples on Social Engineering, how they are used – which ones are successful – Play the role of a hacker, what method would you choose if you were going to engage in Social Engineering?