Anatomy Of A Modern Hack
"...Phase 1, Reconnaissance: Attackers will watch and take notes on who in an organization they need to target, from administrative assistants to executives. Much of this information is gleaned from public Web sites. Phase 2, The Initial Breach: They will use spear-phishing ..."
Reference: www.informationweek.com
.