Top Threats: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Malware</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| rowspan="3" style="vertical-align: middle; border: none;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]]
| rowspan="3" style="vertical-align: middle; border: none;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]]
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Ransomware</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Ransomware<br><br><div style="font-size:smaller;">A type of malware that encrypts files<br>and demands a ransom for their release.</div>
</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br>
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Social Engineering</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:social-engineering.png|frameless|75px|link=Social_Engineering]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Social Engineering</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:social-engineering.png|frameless|75px|link=Social_Engineering]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
Line 12: Line 13:
|}
|}


Malicious software designed to infiltrate and damage computer systems.
 


Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.
Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.


Ransomware: A type of malware that encrypts files and demands a ransom for their release.
Ransomware:  
 
Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.


Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.
Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.

Revision as of 00:37, 15 July 2023

Malware

Malicious software designed to
infiltrate and damage computer systems.
     Link=Malware


Stalking-hyenas.png
Ransomware

A type of malware that encrypts files
and demands a ransom for their release.
     File:Ransomware.png


Social Engineering
     File:Social-engineering.png             


Phishing
     File:Phishing.png             


Data Breach
     File:Data-breach.png
Insiders
     File:Insiders.png


Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.

Ransomware: Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.

Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.