|
Malware Malicious software designed to infiltrate and damage computer systems.
|
Ransomware A type of malware that encrypts files and demands a ransom for their release.
|
Phishing Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
|
Social Engineering Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
|
Data Breach Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
|
Insiders Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.
|