Infection by viruses or malicious software
|
|
|
|
|
|
|
Customer impersonated fraudulently (e.g. identity theft)
|
|
|
|
|
|
|
Organisation impersonated via Internet (e.g. phishing attack)
|
|
|
|
|
|
|
Attack on Internet or telecommunications traffic
|
|
|
|
|
|
|
Denial of service attack
|
|
|
|
|
|
|
Actual penetration into the organisation’s network
|
|
|
|
|
|
|
Incidents caused by staff
|
|
|
|
|
|
|