|
Malware  Malicious software designed to infiltrate and damage computer systems.
|
Ransomware  A type of malware that encrypts files and demands a ransom for their release.
|
Phishing  Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
|
Social Engineering  Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
|
Data Breach  Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
|
Insiders  Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.
|