Legitimate users cannot get in due to Spear phishing attack
Spear phishing Attack
Explanation:
A spear-phishing attack typically employs a collection of zombie processes which keeps the target so occupied and busy in responding to a stream of automated requests generated by these zombies. Due to this fact, the legitimate users cannot access the target. It is different from phishing. It is a targeted form of phishing. Spear phishing is an extremely common form of attack on businesses. Since it is very much targeted, spear phishing is the most dangerous type of phishing attack as compared to other types of phishing attacks.
Digital signature is used to ensure the integrity and authenticity of a Word document but requires additional services to be available on the internal network.
This is important as it makes sure that the file is authentic and not malware.