wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

The Evolution of Operating Systems

Blog banner

Direct Memory Access

Blog banner

Cyber Forensics

Blog banner

Developments in Modern Operating Systems

Blog banner

Mendeley (management software)

Blog banner

Memory input output management

Blog banner

Digital Marketing

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Concurrency management in operating systems

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

IP ADDRESS

Blog banner

Multicore and multithreading 171

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Deadlock

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Fitness

Blog banner

Travel: Everything Everywhere!

Blog banner

RAID

Blog banner

OS Assignment 3

Blog banner

Process states

Blog banner

Disk scheduling

Blog banner

Zero-Day Attack

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Reconnaissance

Blog banner

Street foods

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

PHONE TECHNOLOGY

Blog banner

c

Blog banner

Memory Management

Blog banner

Memory Management

Blog banner

PYTHON

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Electronic Funds Transfer

Blog banner

Service Catalogue Management

Blog banner

Different types of scam frauds

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner