| Term 
 | Definition 
 
        | A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Software code that gives access to a program or a service that circumvents normal security protections. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A logical computer network of zombies under the control of an attacker. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A malicious computer code that, like its biological counterpart, reproduces itself on the same computer. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The act of digging through trash receptacles to find information that can be useful in an attack. |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | An attack that creates a fictitious character and then plays out the role of that person on a victim. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Captures and stores each keystroke that a user types on the computers keyboard. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Computer code that lies dormant until it is triggered by a specific logical event. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Software that enters a computer system without the users knowledge or consent and then performs an unwantedand usually harmfulaction. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A phishing attack that automatically redirects the user to a fake site. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A set of software tools used by an attacker to hide the actions or presence of other types of malicious software. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Watching an authorized user enter a security code on a keypad. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A means of gathering information for an attack by relying on the weaknesses of individuals. |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | A phishing attack that targets only specific users. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A variation of spam, which targets instant messaging users instead of e-mail users. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A general term used to describe software that spies on users by gathering information without consent, thus violating their privacy. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The act of unauthorized individuals entering a restricted-access building by following an authorized user. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An executable program advertised as performing one activity, but actually does something else (or it may perform both the advertised and malicious activities). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A phishing attack that uses a telephone call instead of using e-mail. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A phishing attack that targets only wealthy individuals. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Horizontally separating words so that they can still be read by the human eye. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer and then self-replicate to other computers. |  | 
        |  |