wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

virtual machine

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

MUTUAL EXCLUSION

Blog banner

K-means use cases

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Mobile Survey

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

SQL Injection

Blog banner

All you need to know about Website Traffic

Blog banner

Google classroom

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

CoWIN

Blog banner

Elegant fashion style

Blog banner

On-Page SEO

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Boxing

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Starting Android Activity Using Intent

Blog banner

Deadlock

Blog banner

VIRTUAL MACHINES

Blog banner

Guidelines for a low sodium diet.

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

What is Packet Filtering?

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Street foods

Blog banner

VPN

Blog banner

Buffering

Blog banner

WINDOWS I/ O

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Memory Management

Blog banner

Royal enfield

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Memory Management - operating system

Blog banner

SECURITY TOOLS

Blog banner

Socket Programming in Java

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Deadlock Prevention

Blog banner

DURGA POOJA

Blog banner

Deadlock and Starvation

Blog banner

Not anti-social, but pro-solitude

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Fault Tolerance

Blog banner