Watch this video on YouTube
What is the primary objective of salami slicing attacks in cyber-security?