Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: white; text-align: center;" | {| class="wikitable" style="border: none; background-color: white; text-align: center;" | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: center;" | | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div> [[File:malware.png|frameless|75px|Link=Malware]]</div><br><br> | ||
| style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 2 | | style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 2 | ||
| style="vertical-align: middle; border: none; text-align: center;" | | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Ransomware<br><br><div style="font-size:smaller;">A type of malware that encrypts files<br>and demands a ransom for their release.</div> | ||
</div> [[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br> | |||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div> [[File:malware.png|frameless|75px|Link=Malware]]</div><br><br> | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div> [[File:malware.png|frameless|75px|Link=Malware]]</div><br><br> | ||
Line 17: | Line 18: | ||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div> [[File:insiders.png|frameless|75px|link=Insiders]]</div> | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div> [[File:insiders.png|frameless|75px|link=Insiders]]</div> | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: center;" | | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Data Breach<br><br><div style="font-size:smaller;">Unauthorized access to sensitive data,<br>resulting in potential identity theft<br>and privacy breaches.</div></div> [[File:data-breach.png|frameless|75px|link=Data_Breach]]</div> | ||
| style="vertical-align: middle; border: none; text-align: center;" | | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: column; align-items: center; justify-content: center;"> | ||
| style="vertical-align: middle; border: none; text-align: center;" | | [[File:insiders.png|frameless|75px|link=Insiders]] | ||
<div style="position:relative; font-weight:bold; text-align: left;"> | |||
Insiders<br><br> | |||
<div style="font-size:smaller">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div> | |||
</div> | |||
</div> | |||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div> [[File:insiders.png|frameless|75px|link=Insiders]]</div> | |||
|} | |} |
Revision as of 23:16, 16 July 2023
Malware Link=MalwareMalicious software designed to infiltrate and damage computer systems. |
Placeholder Cell 2 | Ransomware File:Ransomware.pngA type of malware that encrypts files
and demands a ransom for their release. |
Malware Link=MalwareMalicious software designed to infiltrate and damage computer systems. |
Ransomware File:Ransomware.pngA type of malware that encrypts files
and demands a ransom for their release. | |
Social Engineering File:Social-engineering.png Manipulative techniques exploiting
human behavior to gain unauthorized access to systems. |
Phishing File:Phishing.png Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details. | |
Data Breach File:Data-breach.pngUnauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. |
Insiders File:Insiders.pngTrusted individuals who cause operational disruptions, leak sensitive data, or commit fraud. | |
Data Breach File:Data-breach.pngUnauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. |
Insiders Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.
|
Insiders File:Insiders.pngTrusted individuals who cause operational disruptions, leak sensitive data, or commit fraud. |