As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.​​ Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?