wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Why Data Security Is Important

Blog banner

Operating System

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

College Life

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Bulk E-mail software

Blog banner

K-means use cases

Blog banner

How to Build an Effective Digital Campaign

Blog banner

MailChimp

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Comprehensive Bitcoin Mining - Aarti Dabholkar

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Odoo

Blog banner

Session Hijacking

Blog banner

Modern Operating system

Blog banner

The Memory Hierarchy

Blog banner

Expert System In AI

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Why we fail after giving 100% ?

Blog banner

Modern operating systems (OS)

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Real-time Scheduling - 53003230061

Blog banner

The art of living with machines...

Blog banner

Principal of concurrency

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

Study of Sniffing Tools

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Hacking of web server and application

Blog banner

Install Ubuntu Easily

Blog banner

What is Spyware?

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Difference Between Classification And Clustering

Blog banner

Place to visit in pune

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Principles of Concurrency

Blog banner

Wedding photographer

Blog banner

Characteristics of Etherum

Blog banner

PHONE TECHNOLOGY

Blog banner

Study on cyber and network forensic in computer security management

Blog banner