Top Threats: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 2: Line 2:
|-
|-
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]]
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Malware<br>[[File:malware.png|frameless|75px|Link=Malware]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Malware<br>[[File:malware.png|frameless|75px|link=Malware]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Ransomware<br>[[File:ransomware.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Ransomware<br>[[File:ransomware.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:phishing.png|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:phishing.png|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>

Revision as of 23:29, 6 August 2023

Stalking-hyenas.png
Malicious software designed to infiltrate and damage computer systems.
A type of malware that encrypts files and demands a ransom for their release.
Phishing
File:Phishing.png
Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
Social Engineering
File:Social-engineering.png
Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
Data Breach
File:Data-breach.png
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
File:Insiders.png
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.