Top Threats: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: | {| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;" | ||
|- | |- | ||
| style="vertical-align: middle; border: none; | | rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]] | ||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Malware<br>[[File:ACT_Malware_Icon.svg|frameless|75px|link=Malware]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div> | |||
| style="vertical-align: middle; border: none; text-align | | style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Ransomware<br>[[File:ACT_Ransomware_Icon.svg|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div> | ||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div> | |||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: | | style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]<div style="font-size:smaller; font-weight:normal;">Manipulative techniques exploiting human behavior to gain unauthorized access to systems.</div></div> | ||
</div | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div> | ||
| style="vertical-align: middle; border: none; | | style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div> | ||
| style="vertical-align: middle; border: none; text-align: | |||
|} | |} |
Latest revision as of 22:49, 15 August 2023
Malicious software designed to infiltrate and damage computer systems.
|
A type of malware that encrypts files and demands a ransom for their release.
|
||