Top Threats: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
</div> [[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br> | </div> [[File:ransomware.png|frameless|75px|link=Ransomware]]</div><br><br> | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Social Engineering<br><br><div style="font-size:smaller;">Manipulative techniques that exploit human<br>behavior | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold;">Social Engineering<br><br><div style="font-size:smaller;">Manipulative techniques that exploit human<br>behavior to gain unauthorized access to systems.</div> | ||
</div> [[File:social-engineering.png|frameless|75px|link=Social_Engineering]] </div><br><br> | </div> [[File:social-engineering.png|frameless|75px|link=Social_Engineering]] </div><br><br> | ||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Phishing<br><br><div style="font-size:smaller;">Deceptive tactics used to trick<br>users into revealing sensitive information.</div></div> [[File:phishing.png|frameless|75px|link=Phishing]] </div><br><br> | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold;">Phishing<br><br><div style="font-size:smaller;">Deceptive tactics used to trick<br>users into revealing sensitive information.</div></div> [[File:phishing.png|frameless|75px|link=Phishing]] </div><br><br> |
Revision as of 00:52, 15 July 2023
Malware Link=MalwareMalicious software designed to infiltrate and damage computer systems. |
Ransomware File:Ransomware.pngA type of malware that encrypts files
and demands a ransom for their release. | |
Social Engineering File:Social-engineering.png Manipulative techniques that exploit human
behavior to gain unauthorized access to systems. |
Phishing File:Phishing.png Deceptive tactics used to trick users into revealing sensitive information. | |
Data Breach File:Data-breach.pngUnauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. |
Insiders File:Insiders.pngTrusted individuals who cause operational disruptions, leak sensitive data, or commit fraud. |