A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service.
A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events
An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim.