wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Scheduling

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Music

Blog banner

Security in Operating Systems

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Linux 94

Blog banner

AI and Cyber Security

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Importance of Website

Blog banner

Texting is actually better than talking in person

Blog banner

Processes : Process description and control

Blog banner

ZOHO

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

MPL and how its effects?

Blog banner

What is OS and its overview

Blog banner

Random Forests

Blog banner

Cache memory

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Modern OS

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Bharat Maps

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

computer security

Blog banner

Modern Operating System

Blog banner

Evolution of OS

Blog banner

Loneliness

Blog banner

Sweet Mango Murabba

Blog banner

Starting Android Activity Using Intent

Blog banner

Security in Cloud Computing

Blog banner

My Favorite Country

Blog banner

Deadlocks

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Environmental Management using GIS

Blog banner

Business Intelligence v/s Big Data

Blog banner

Electronic Funds Transfer

Blog banner