An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim.
A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service.