The process of taking an unencrypted message which is in plaintext and applying a mathematical function to it to produce an encrypted message (ciphertext) is called ______
At which stage of an adversarial threat attack does the attacker craft phishing and other attacks and counterfeit entities, create and operate false-fronts to inject malicious components?