1.
Intrusive software designed to infiltrate a computer system without the owner’s informed consent.
2.
The practice of sending a fraudulent electronic communication with a link or an attachment that may appear to be from a trustworthy source, to obtain unauthorized access to sensitive information.
3.
Communicating directly or taking other action for the purpose of promoting, supporting, modifying, opposing, or delaying legislative or administrative action through use or provision of information, statistics, studies, or analyses.
4.
Can be any action taken to punish someone for, or deter someone from, reporting observed or potential misconduct, or for participating in an investigation
5.
Is defined as an uncontrolled unplanned fire that spreads rapidly through areas of combustible vegetation, such as forests, grasslands or brushlands.