Top Threats

From GCA ACT
Jump to navigationJump to search
Stalking-hyenas.png
Malicious software designed to infiltrate and damage computer systems.
A type of malware that encrypts files and demands a ransom for their release.
Phishing
File:Phishing.png
Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
Social Engineering
File:Social-engineering.png
Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
Data Breach
File:Data-breach.png
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
File:Insiders.png
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.