A user received a malicious attachment but did not run it. Which category classifies the intrusion?
weaponization
reconnaissance
installation
delivery
Submit