Top Threats: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created page with "Malicious software designed to infiltrate and damage computer systems. Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information. Ransomware: A type of malware that encrypts files and demands a ransom for their release. Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized acces...")
 
No edit summary
 
(19 intermediate revisions by the same user not shown)
Line 1: Line 1:
Malicious software designed to infiltrate and damage computer systems.
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
 
|-
Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]]
 
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Malware<br>[[File:ACT_Malware_Icon.svg|frameless|75px|link=Malware]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div>
Ransomware: A type of malware that encrypts files and demands a ransom for their release.
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Ransomware<br>[[File:ACT_Ransomware_Icon.svg|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
 
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
|-
 
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]<div style="font-size:smaller; font-weight:normal;">Manipulative techniques exploiting human behavior to gain unauthorized access to systems.</div></div>
Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div>
|}

Latest revision as of 22:49, 15 August 2023

Stalking-hyenas.png
Malware
ACT Malware Icon.svg
Malicious software designed to infiltrate and damage computer systems.
Ransomware
ACT Ransomware Icon.svg
A type of malware that encrypts files and demands a ransom for their release.
Phishing
ACT Phishing Icon.svg
Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
Social Engineering
ACT Social Engineering Icon.svg
Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
Data Breach
ACT Data Breach Icon.svg
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
ACT Insiders Icon.svg
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.