Replication Through Removable Media

Internal Threat Actor

Spear phishing for information

Quid Pro Quo for service attack

Dumpster Diving

Robocall Attack

Impersonation Attack

Reverse Social Engineering

Shoulder Surfing

Chain Letter and Hoaxes