wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Deming’s Process

Blog banner

DISK SCHEDULING

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Deadlock

Blog banner

Child labour

Blog banner

Semaphores

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Security issues

Blog banner

VPN

Blog banner

The evolution of OS

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Photography

Blog banner

Water Resources are about to exhaust...

Blog banner

Starvation

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Environmental Management using GIS

Blog banner

Memory

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

How to write a cover letter

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

How to make Pancakes

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Defining youtubr

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

How Cyber Forensics use in AI

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Product Discount Calculator

Blog banner

My favourite food

Blog banner

What your Favorite colour says about You?

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

FIREWALL

Blog banner

File management

Blog banner

Virtualization

Blog banner

BrainGate Technology

Blog banner

RAID_142

Blog banner

History of ITIL

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Types of OS

Blog banner

Scheduling

Blog banner