Advanced Security

From GCA ACT
Jump to navigationJump to search
Malware

Malicious software designed to
infiltrate and damage computer systems.
     Link=Malware


Placeholder Cell 2
Ransomware

A type of malware that encrypts files
and demands a ransom for their release.
     File:Ransomware.png


Malware

Malicious software designed to
infiltrate and damage computer systems.
     Link=Malware


Stalking-hyenas.png
Ransomware

A type of malware that encrypts files
and demands a ransom for their release.
     File:Ransomware.png


Social Engineering

Manipulative techniques exploiting
human behavior to gain unauthorized
access to systems.
     File:Social-engineering.png             


Phishing

Deceptive tactics used to trick
users into revealing sensitive information
such as passwords or personal details.
     File:Phishing.png             


Data Breach

Unauthorized access to sensitive data,
resulting in potential identity theft
and privacy breaches.
     File:Data-breach.png
Insiders

Trusted individuals who cause operational
disruptions, leak sensitive data,
or commit fraud.
     File:Insiders.png
Data Breach

Unauthorized access to sensitive data,
resulting in potential identity theft
and privacy breaches.
     File:Data-breach.png

File:Insiders.png

Insiders

Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.
Insiders

Trusted individuals who cause operational
disruptions, leak sensitive data,
or commit fraud.
     File:Insiders.png