|
|
Line 1: |
Line 1: |
| {| class="wikitable" style="border: none; background-color: white; text-align: center;"
| | |
| |-
| |
| | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div> [[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| |
| | style="vertical-align: middle; border: none; text-align: center;" | Placeholder Cell 2
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Ransomware<br><br><div style="font-size:smaller;">A type of malware that encrypts files<br>and demands a ransom for their release.</div>
| |
| </div> [[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br>
| |
| |-
| |
| | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold;">Malware<br><br><div style="font-size:smaller;">Malicious software designed to<br>infiltrate and damage computer systems.</div></div> [[File:malware.png|frameless|75px|Link=Malware]]</div><br><br>
| |
| | rowspan="3" style="vertical-align: middle; border: none;" | [[File:elephants.png|frameless|300px|link=Advanced_Protection]]
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Ransomware<br><br><div style="font-size:smaller;">A type of malware that encrypts files<br>and demands a ransom for their release.</div>
| |
| </div> [[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br>
| |
| |-
| |
| | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Social Engineering<br><br><div style="font-size:smaller;">Manipulative techniques exploiting<br>human behavior to gain unauthorized<br>access to systems.</div>
| |
| </div> [[File:social-engineering.png|frameless|75px|link=Social_Engineering]] </div><br><br>
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Phishing<br><br><div style="font-size:smaller;">Deceptive tactics used to trick<br>users into revealing sensitive information<br>such as passwords or personal details.</div></div> [[File:phishing.png|frameless|75px|link=Phishing]] </div><br><br>
| |
| |-
| |
| | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Data Breach<br><br><div style="font-size:smaller;">Unauthorized access to sensitive data,<br>resulting in potential identity theft<br>and privacy breaches.</div></div> [[File:data-breach.png|frameless|75px|link=Data_Breach]]</div>
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div> [[File:insiders.png|frameless|75px|link=Insiders]]</div>
| |
| |-
| |
| | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Data Breach<br><br><div style="font-size:smaller;">Unauthorized access to sensitive data,<br>resulting in potential identity theft<br>and privacy breaches.</div></div> [[File:data-breach.png|frameless|75px|link=Data_Breach]]</div>
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: column; align-items: center; justify-content: center;">
| |
| [[File:insiders.png|frameless|75px|link=Insiders]]
| |
| <div style="position:relative; font-weight:bold; text-align: left;">
| |
| Insiders<br><br>
| |
| <div style="font-size:smaller">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div>
| |
| </div>
| |
| </div>
| |
| | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Insiders<br><br><div style="font-size:smaller">Trusted individuals who cause operational<br>disruptions, leak sensitive data,<br>or commit fraud.</div></div> [[File:insiders.png|frameless|75px|link=Insiders]]</div>
| |
| |}
| |