wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Self-love: Being the reason of your own smile

Blog banner

ODOO

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Service stratergy principles

Blog banner

The evolution of OS

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

IoT Architecture Based Security

Blog banner

Scheduling in Operating Systems

Blog banner

Deadlock

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

EdTech (Education Technology)

Blog banner

Importance Of Education.

Blog banner

security controls

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

ahh wait a min

Blog banner

Phishing

Blog banner

Explain DBMS in Brief

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Virtual Machine

Blog banner

The art of being alone

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

LIFEHACKER

Blog banner

The Evolution of Operating Systems

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

IT service level agreement

Blog banner

HR Automation : Need of the hour

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Memory Management

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Precision-Recall in Data Science

Blog banner

Malicious softwares

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Fault Tolerance

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner