Baiting: The use of bait such as a flash disc or CD that appeals to the curiosity or greed of the user, for instance, a flash disc labelled with a competitor’s logo. Once plugged in, the disc will infect the computer or the network with malware or spyware.
Malware: Malicious software design to damage a computer or network or gather information.
Phishing: An attempt, usually by email, to get sensitive information, such as usernames, passwords or card details by pretending to be a trustworthy and legitimate business such as bank.
Spear Phishing: Emails are more targeted than the generic phishing emails, and sent to specific users to create a higher penetration rate.
Social Engineering: Psychological manipulation of people to divulge sensitive information. This might be to befriend someone through social media sites to gain their trust and to receive sensitive information from them.
Spyware: Software design to gather information from a computer or network without the user being aware.
Tail gating: Where someone enters a secure area by following an employee who often holds the door open for the person who does not possess the correct valid permits to be there.
Trojans / Trojan Horse: Malware designed to look like something other than that of its true intent. Through email or physical discs, the software might purport to be one thing but is actually another.