ALL >> Computer-Programming >> View Article
Threats To Computer System
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.
Types of threats
security threats
physical threats
Non physical threats.
1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.
2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.
There are 3 main categories that classifies the physical threats.
Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.
External:- These threats include lightning, floods, earthquake etc.
Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional ...
... errors.
3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.
loss or corruption of system data
loss of sensitive information
cyber security branches
others.
The non-physical threats are also known as logical Threats.
The following list is the common types of non-physical threats.
virus
key loggers
spyware
adware
phishing
worms
other computer security risks.
It is said that “Knowledge is Power” and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge and experiences for the wise Gen z.
SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.
Add Comment
Computer Programming Articles
1. Quick & Reliable Otdr & Splicing Machine Service In MumbaiAuthor: bdean
2. Compiler Design Tutorial: Step-by-step Explanation Of All Compiler Phases
Author: Tech Point
3. Learn Design And Analysis Of Algorithms Tutorial With Simple Examples
Author: Tech Point
4. Empowering Businesses With Custom Software Development
Author: Rudram Technology Solutions
5. Website Design Company In Coimbatore – Build A Strong Digital Presence
Author: Icore
6. Vetted Indian Software Engineers: Which Platforms Actually Deliver And What Roi Should You Expect
Author: doaguru infosystems
7. Top Programming Languages & Frameworks We're Using For Custom Projects In 2026
Author: PawanReddy
8. The Top 10 Custom Software Development Trends Shaping 2026
Author: PawanReddy
9. Dbms Tutorial: Step-by-step Guide To Master Database Management System
Author: Tech Point
10. Learn Programming Efficiently With A Data Structures And Algorithms Tutorial
Author: Tech Point
11. How To Choose The Best Cybersecurity Certification That Offers Top Career Opportunities For You
Author: Lorcam Securities
12. Best C# Tutorial 2026: Master C# For Web And Desktop Development
Author: Tech Point
13. Data Center Cooling Market Growth, Trends & Forecast 2032 | Gmr
Author: Caitan Cruz
14. Ceh, Oscp, Or Comptia Security+: Which Cybersecurity Certification Is Best For You?
Author: Lorcam Securities
15. Microsoft Power Automate Workflow Automation Services
Author: brainbell10






