Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 1
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 2
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 2
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 3
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Ransomware<br><br><div style="font-size:smaller;">A type of malware that encrypts files<br>and demands a ransom for their release.</div>
</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br>
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
Line 17: Line 18:
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:insiders.png|frameless|75px|link=Insiders]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:insiders.png|frameless|75px|link=Insiders]]</div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 4
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Data Breach<br><br><div style="font-size:smaller;">Unauthorized access to sensitive data,<br>resulting in potential identity theft<br>and privacy breaches.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:data-breach.png|frameless|75px|link=Data_Breach]]</div>
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 5
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: column; align-items: center; justify-content: center;">
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 6
[[File:insiders.png|frameless|75px|link=Insiders]]
<div style="position:relative; font-weight:bold; text-align: left;">
Insiders<br><br>
<div style="font-size:smaller">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div>
</div>
</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:insiders.png|frameless|75px|link=Insiders]]</div>
|}
|}

Revision as of 23:16, 16 July 2023

Malware

Malicious software designed to
infiltrate and damage computer systems.
     Link=Malware


Placeholder Cell 2
Ransomware

A type of malware that encrypts files
and demands a ransom for their release.
     File:Ransomware.png


Malware

Malicious software designed to
infiltrate and damage computer systems.
     Link=Malware


Stalking-hyenas.png
Ransomware

A type of malware that encrypts files
and demands a ransom for their release.
     File:Ransomware.png


Social Engineering

Manipulative techniques exploiting
human behavior to gain unauthorized
access to systems.
     File:Social-engineering.png             


Phishing

Deceptive tactics used to trick
users into revealing sensitive information
such as passwords or personal details.
     File:Phishing.png             


Data Breach

Unauthorized access to sensitive data,
resulting in potential identity theft
and privacy breaches.
     File:Data-breach.png
Insiders

Trusted individuals who cause operational
disruptions, leak sensitive data,
or commit fraud.
     File:Insiders.png
Data Breach

Unauthorized access to sensitive data,
resulting in potential identity theft
and privacy breaches.
     File:Data-breach.png

File:Insiders.png

Insiders

Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.
Insiders

Trusted individuals who cause operational
disruptions, leak sensitive data,
or commit fraud.
     File:Insiders.png