Top Threats: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 8: Line 8:
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Phishing</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:phishing.png|frameless|75px|link=Phishing]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Phishing</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:phishing.png|frameless|75px|link=Phishing]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]</div>
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Data Breach</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:data-breach.png|frameless|75px|link=Data_Breach]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Email & Reputation</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:protect-email-reputation.png|frameless|75px|link=Email_Reputation]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Insiders</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:insiders.png|frameless|75px|link=Insiders]]</div>
|}
|}



Revision as of 00:26, 15 July 2023

Malware
     Link=Malware


Stalking-hyenas.png
Ransomware
     File:Ransomware.png


Social Engineering
     File:Social-engineering.png             


Phishing
     File:Phishing.png             


Data Breach
     File:Data-breach.png
Insiders
     File:Insiders.png

Malicious software designed to infiltrate and damage computer systems.

Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.

Ransomware: A type of malware that encrypts files and demands a ransom for their release.

Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.

Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.