Top Threats
From GCA ACT
Jump to navigationJump to search
Malware File:Malware.png Malicious software designed to infiltrate and damage computer systems.
|
Ransomware File:Ransomware.png A type of malware that encrypts files and demands a ransom for their release.
|
Phishing
File:Phishing.png Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details. | |
Social Engineering
File:Social-engineering.png Manipulative techniques exploiting human behavior to gain unauthorized access to systems. |
Data Breach
File:Data-breach.png Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. |
Insiders
File:Insiders.png Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud. |