The top 15 common cybersecurity risk in the U.S are: Malware- when an unwanted piece of programming or software installs itself on a target system, causing unusual behavior. Password Theft- an unwanted third-party managed to steal or guess your password and has since run amok with the information. Traffic Interception(Eavesdropping)- when a third-party listens to info sent between a user and a host. Phishing Attacks- An end user receives a message or email which request sensitive data, such as a password. DDoS- attack method in which malicious partners target servers and overload them with user traffic. Cross site Attack- third-party will target a vulnerable website, typically one lacking encryption. Zero-Day Exploits- a targeted attack against a system, network, or software. SQL Injection- essentially data manipulation implemented to access information which isn’t meant to be available. Social Engineering- the umbrella method for attempting to deceive users into giving away sensitive details. MitM Attack- a third party hijacks a session between client and host. Ransomware- variants of malware. Crypto jacking- an attempt to install malware which forces the infected system to perform “crypto- mining” a popular form of gaining crypto- currency. Water Hole Attack- the goal- much like a cross- site attack- is a to load a malicious pay load from the infected sites. Drive by Attack- malicious code is delivered onto a system or device. Trojan Virus- attempts to deliver its payload by disguising itself as legitimate software. Many of which occur in China also, in which way they are always beefing up their security systems.