Threats template: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created page with "{| class="wikitable" |- | colspan="2" valign="top"| frameless|40px|link=Malware <big>'''Introduction'''</big> <br> | colspan="1" valign="top"| frameless|100px|right|link=Top_Threats {| role="presentation" class="wikitable mw-collapsible mw-collapsed" | <strong>Cybersecurity Tools</strong> |- | {{#categorytree:Antivirus & Anti-malware Software|mode=pages|hideroot|all}} |} |- | valign="top" | <big>'''Types of Ma...") |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| | | style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] <big>'''Introduction'''</big> <br> | ||
[[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] <big>'''Introduction'''</big> <br> | |||
| | | style="width: 30%; vertical-align: top;" colspan="1" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]] | ||
[[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]] | |||
{| role="presentation" class="wikitable mw-collapsible mw-collapsed" | {| role="presentation" class="wikitable mw-collapsible mw-collapsed" | ||
| <strong>Cybersecurity Tools</strong> | | <strong>Cybersecurity Tools</strong> | ||
Line 13: | Line 11: | ||
|} | |} | ||
|- | |- | ||
| | | style="width: 10%; vertical-align: top;" | <big>'''Types of Malware'''</big><br> | ||
| style="width: 10%; vertical-align: top;" | <big>'''Distribution and Infection'''</big><br> | |||
| | | style="width: 10%; vertical-align: top;" | <big>'''Impact and Prevention'''</big><br> | ||
|- | |- | ||
| colspan="3" | | | colspan="3" style="vertical-align: top;" | <big>'''Conclusion'''</big><br> | ||
<big>'''Conclusion'''</big><br> | |||
|} | |} |
Latest revision as of 05:19, 30 October 2023
Introduction |
| |||
Types of Malware |
Distribution and Infection |
Impact and Prevention | ||
Conclusion |