wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

A-B-C of Networking: Part-1 (Basics)

Blog banner

Deadlock

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Web Site

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

"Life as a Part-time Student"

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Deadlock

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Dekkers Algorithm

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Vikrant’s first blog

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Number Guessing game --lisp

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Life

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Big O Notation

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

THREADS (assignment 1)

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Recipe of Paneer Butter Masala

Blog banner

HTML vs HTML5

Blog banner

Deming’s Process

Blog banner

Security requirements for Safe E-Payments

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Visualization in Data Science

Blog banner

Why is ITSM important in IT organization?

Blog banner

Mariana Trench: The deepest depths

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Article on Zoho Corporation

Blog banner

Apple

Blog banner

Women Empowerment

Blog banner

Dudhasagar waterfall ?

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

SECURITY TOOLS

Blog banner

Texting is actually better than talking in person

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Multiprocessor and scheduling

Blog banner