Threats template: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created page with "{| class="wikitable" |- | colspan="2" valign="top"| frameless|40px|link=Malware <big>'''Introduction'''</big> <br> | colspan="1" valign="top"| frameless|100px|right|link=Top_Threats {| role="presentation" class="wikitable mw-collapsible mw-collapsed" | <strong>Cybersecurity Tools</strong> |- | {{#categorytree:Antivirus & Anti-malware Software|mode=pages|hideroot|all}} |} |- | valign="top" | <big>'''Types of Ma...")
 
No edit summary
 
Line 1: Line 1:
{| class="wikitable"
{| class="wikitable"
|-
|-
| colspan="2" valign="top"|  
| style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] <big>'''Introduction'''</big> <br>
[[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] <big>'''Introduction'''</big> <br>


| colspan="1" valign="top"|
| style="width: 30%; vertical-align: top;" colspan="1" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]
[[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]
{| role="presentation" class="wikitable mw-collapsible mw-collapsed"
{| role="presentation" class="wikitable mw-collapsible mw-collapsed"
| <strong>Cybersecurity Tools</strong>
| <strong>Cybersecurity Tools</strong>
Line 13: Line 11:
|}
|}
|-
|-
| valign="top" | <big>'''Types of Malware'''</big><br>
| style="width: 10%; vertical-align: top;" | <big>'''Types of Malware'''</big><br>


| style="width: 10%; vertical-align: top;" | <big>'''Distribution and Infection'''</big><br>


| valign="top" | <big>'''Distribution and Infection'''</big><br>
| style="width: 10%; vertical-align: top;" | <big>'''Impact and Prevention'''</big><br>
 
 
| valign="top" | <big>'''Impact and Prevention'''</big><br>
 
|-
|-
| colspan="3" |  
| colspan="3" style="vertical-align: top;" | <big>'''Conclusion'''</big><br>
<big>'''Conclusion'''</big><br>
 
|}
|}

Latest revision as of 05:19, 30 October 2023

ACT Malware Icon.svg Introduction
Stalking-hyenas.png
Types of Malware
Distribution and Infection
Impact and Prevention
Conclusion