| http://www.w3.org/ns/prov#value | - Instead of spending time trying to crack a computer system from afar the attacker will instead try to manipulate the victim into divulging sensitive information, such as a password to a company network, or personal credit card information.
|