wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Why we fail after giving 100% ?

Blog banner

5 Stages of Digital Marketing

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Data Mining

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Virtual memory in windows

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Cyber Forensics on IOT Devices

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Network Security Risks

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Animal’s have my heart

Blog banner

Data Security must be your Priority!

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Decision Tree: A Diagram Model

Blog banner

Assignment-3

Blog banner

Game Theory in Blockchain

Blog banner

operating system

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Deadlock and starvation in operating system

Blog banner

File Management In OS

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Explain Kernel in OS

Blog banner

What is M-commerce and how it's work

Blog banner

objectives and functions of operating system

Blog banner

Multiprocessor and scheduling

Blog banner

Smitten Kitchen Keepers

Blog banner

Teamwork

Blog banner

Multiprocessor

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Virtual Machine

Blog banner

Photorec - media recovery tool

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Wiretapping

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Understanding the 'Ambiverts'

Blog banner

Blockchain in IoT Applications

Blog banner

Vulnerability Assessment

Blog banner

Modern Operating Systems

Blog banner

POVERTY:Causes and solutions to problems

Blog banner