wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

The Sunny Side of Instagram

Blog banner

Operation system

Blog banner

Deadlock in operating system

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Modern Operating System

Blog banner

Khau Galli – Vile Parle

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

PERT Overview

Blog banner

IoT Architecture Based Security

Blog banner

Mutual exclusion

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Life

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Note on Process, Process creation and Process termination

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

GIS Mapping

Blog banner

LIFEHACKER

Blog banner

Threads in OS

Blog banner

Data Visualization

Blog banner

Virtual memory in os

Blog banner

Virtual memory in Operating System

Blog banner

Virtual memory

Blog banner

My Favorite Country

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

FASHION

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Principal of concurrency

Blog banner

Corporate Discipline.

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Multiprocessor and Multicore Organization

Blog banner

IO Buffers

Blog banner

Measuring IT Risk

Blog banner

File and File System Structure

Blog banner

Blockchain Security Technique

Blog banner

PERSONAL STORIES

Blog banner

Uniprocessor scheduling

Blog banner

What is Internet

Blog banner

Google App Engine

Blog banner

Virtual memory

Blog banner