Top Threats: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Phishing</div> [[File:phishing.png|frameless|75px|link=Phishing]] </div><br><br> | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Phishing</div> [[File:phishing.png|frameless|75px|link=Phishing]] </div><br><br> | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;"> | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Data Breach</div> [[File:data-breach.png|frameless|75px|link=Data_Breach]]</div> | ||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;"> | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Insiders</div> [[File:insiders.png|frameless|75px|link=Insiders]]</div> | ||
|} | |} | ||
Revision as of 00:26, 15 July 2023
Malware Link=Malware |
Ransomware File:Ransomware.png | |
Social Engineering File:Social-engineering.png |
Phishing File:Phishing.png | |
Data Breach File:Data-breach.png |
Insiders File:Insiders.png |
Malicious software designed to infiltrate and damage computer systems.
Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.
Ransomware: A type of malware that encrypts files and demands a ransom for their release.
Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.