123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Threats To Computer System

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional ...
... errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

It is said that “Knowledge is Power” and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge and experiences for the wise Gen z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 198Word Count: 266See All articles From Author

Add Comment

Computer Programming Articles

1. How To Get Effective Data Engineering Job Support In The Usa
Author: RKIT Labs Team

2. How To Get Reliable Java Job Support For Professionals In The Usa & Canada
Author: RKIT Labs Team

3. Mastering React Js Faster: Expert Job Support For Developers And Teams
Author: RKIT Labs Team

4. Build Quality And Risk Management Into Your Clinical Operations
Author: Giselle Bates

5. Expert 3d Visualization And Floor Plan Services For Sustainable Growth
Author: I-Tech Lance

6. What Is A Proxy Indicator? A Deep Dive For Investors
Author: Byte Benz

7. Decoding Ai: Understanding The 3 Core Types Of Artificial Intelligence
Author: Byte Benz

8. Master Javafx Tutorial For Modern Ui Development In Java
Author: Tech Point

9. Java Swing Tutorial: A Complete Guide To Building Gui Applications
Author: Tech Point

10. How Erp Software Transforms Hospitals And Small Manufacturing Businesses In 2026
Author: Proplus Logics

11. From Code To Career – Why Ricr Is Bhopal’s Go-to Institute For Data Science & Business Analytics
Author: Rohan Rajput

12. From Fresher To Full-stack Developer With Java Skills
Author: lakshmisssit

13. Learn, Code, Analyze – Ricr Is Transforming Data Science & Coding Education In Bhopal
Author: Rohan Rajput

14. Building A Secure E-commerce Website With Core Php: Best Practices
Author: Andy

15. How To Choose The Right Software Development Partner For Your Business
Author: Rudram Technology Solutions LLP

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: