wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threats To Computer System

profile
Samiksha Jadhav
Aug 28, 2022
1 Like
0 Discussions
131 Reads

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

 


Comments ()


Sign in

Read Next

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Direct Memory Access

Blog banner

Firewall in Computer Network

Blog banner

VIRTUAL MACHINE

Blog banner

HOW A CENTRAL PROCESSING UNIT (CPU) WORKS?

Blog banner

Virtual machine

Blog banner

Data Visualization

Blog banner

Data Mining

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Use case of K-means clustering

Blog banner

Population

Blog banner

File management

Blog banner

Process State

Blog banner

semaphores

Blog banner

Memory Partitioning

Blog banner

Threads in OS

Blog banner

Topic: Sessions in Operating system

Blog banner

Photorec - media recovery tool

Blog banner

Routers

Blog banner

Know your Processors!

Blog banner

How to Run your First android App

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Article on Zoho Corporation

Blog banner

Europe Through My Lens

Blog banner

Creating Digitally Signed Document

Blog banner

Harsh Rathod

Blog banner

Deadlock

Blog banner

Go Daddy

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Hubspot

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Fault Tolerance in an Operating System

Blog banner

Importance of modern technology era

Blog banner

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

DBMS and various career options related to it.

Blog banner