Malware (Viruses etc.):
Harmful software that sneaks onto devices to steal, damage, or control information.
Social Engineering:
Tricks that fool people into giving away information or access.
Network Attacks:
Attempts to break into or disrupt communication systems.
Physical and Environmental:
Risks like theft, fire, or flooding that can damage equipment or data.
Supply Chain and 3rd Party:
Problems caused when outside suppliers or partners are compromised.
Access and Identity:
When someone gains access they shouldn’t have, often by stealing passwords or pretending to be someone else.
Insider Threats:
Risks coming from people within an organisation who misuse their access.
Advanced Persistent Threats (APTs):
Skilled attackers who secretly break in and stay hidden for a long time.
Data Breaches:
When private or sensitive information is accessed or released without permission.
IoT Vulnerabilities:
Weaknesses in smart devices that can be exploited to gain access or cause damage.
Ransomware:
Malware that locks your files and demands payment to unlock them.