123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Threats To Computer System

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional ...
... errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

It is said that “Knowledge is Power” and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge and experiences for the wise Gen z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 222Word Count: 266See All articles From Author

Add Comment

Computer Programming Articles

1. Best Crm Features Every Small Business Should Use In 2025
Author: Aimbeat Insights

2. Why Learn Data Science For 2026?
Author: TCCI - Tririd Computer Coaching Institute

3. Full Stack Developer Training Iskcon Cross Road: Join Tcci Now
Author: TCCI - Tririd Computer Coaching Institute

4. Top 5 Crm Systems That Integrate With Google Workspace
Author: Orson Amiri

5. It Career Guidance: Free Counseling At Tcci Institute
Author: TCCI - Tririd Computer Coaching Institute

6. Data Structure & Algorithms (dsa): Tcci Coaching
Author: TCCI - Tririd Computer Coaching Institute

7. The Copilot Effect: 7 Real Productivity Wins Businesses Are Seeing Right Now
Author: ECF Data

8. Ultimate Cucumber Testing Tutorial For Testers: Concepts, Workflow & Advantages
Author: Tech Point

9. Postman Tutorial: How To Test Apis Quickly And Efficiently
Author: Tech Point

10. Learn Python Programming South Bopal, Ahmedabad
Author: TCCI - Tririd Computer Coaching Institute

11. Job-oriented It Training In Ahmedabad: Why Tcci?
Author: TCCI - Tririd Computer Coaching Institute

12. Core Java Classes Near Iskcon Circle: Tcci Expert Faculty
Author: TCCI - Tririd Computer Coaching Institute

13. Why Learning Javascript Is Still King In Web Dev
Author: TCCI - Tririd Computer Coaching Institute

14. Data Science Course Near South Bopal: Best Computer Classes
Author: TCCI - Tririd Computer Coaching Institute

15. From Zero To Coder: Tcci's Programming Roadmap
Author: TCCI - Tririd Computer Coaching Institute

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: