wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Paid Email

Blog banner

INTERNET SECURITY

Blog banner

DBMS and various career options related to it.

Blog banner

Mumbai local ......

Blog banner

Odoo

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Zero-Day Attack

Blog banner

The evolution of OS

Blog banner

Linux VServer Architecture

Blog banner

Constrained Management in IT

Blog banner

Who decides your overthinking, anyway?

Blog banner

Career v/s Job : Choose your passion

Blog banner

Fitness regime by Deepesh

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Malware

Blog banner

Cycling

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Gis in agriculture and farming

Blog banner

Senseless Teeths

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Business Engineering

Blog banner

INTRANET

Blog banner

Concept and definition of m-commerce

Blog banner

A True Friendship

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Disk scheduling

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

THE DESIRE OF MANY

Blog banner

Benefits and drawback of web security.

Blog banner

INTRODUCTION

Blog banner

Article on team management software

Blog banner

Memory Management

Blog banner

Memory input output management

Blog banner

Deadlock in operating system

Blog banner

Quality check in IT services

Blog banner

Getting started with Android Studio

Blog banner

IOT Hacking Techniques

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Virtual Memory

Blog banner

Threads

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner