Describe how social engineering threats and vulnerabilities impact users, including phishing, spear phishing, impersonation, shoulder surfing, tailgating, dumpster diving, DDos, DoS, zero-day, man-in-the-middle, brute force, dictionary, rainbow table, spoofing, non-compliant systems, and zombie.