Phishing emails frequently take advantage of high-profile catastrophes reported in the news. Which of the following principles BEST describes the weakness being exploited?
a) Least privilege
b) Social engineering
c) Defense in depth
d) Principle of least astonishment