123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Threats To Computer System

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware of infrastructure. It is the first step to know how to identify security threats to protect the computer system.

Types of threats

‌security threats

‌physical threats

‌Non physical threats.

1) Security threats:- Security threat is defined as a risk that which can potentially harm computer system. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as virus attack.

2) Physical Threats:- A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer system.

There are 3 main categories that classifies the physical threats.

‌Internal:- These Threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.

‌External:- These threats include lightning, floods, earthquake etc.

‌Human:- These threats include theft, vandalism of the infrastructure or hardware, disruption accidental or Intentional ...
... errors.

3) Non-physical Threats:- A non-physical threat is a potential cause of an incident that may result in.

‌loss or corruption of system data

‌loss of sensitive information

‌cyber security branches

‌others.

The non-physical threats are also known as logical Threats.

The following list is the common types of non-physical threats.

‌virus

‌key loggers

‌spyware

‌adware

‌phishing

‌worms

‌other computer security risks.

It is said that “Knowledge is Power” and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge and experiences for the wise Gen z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 146Word Count: 266See All articles From Author

Add Comment

Computer Programming Articles

1. How Digital Publishing Solutions Improve Content Distribution?
Author: tribotz

2. The Evolution And Relevance Of Ibm I (as/400, Iseries) In Modern Business
Author: Siddhant Saxena

3. Ai Software Development Services In Japan: Shaping The Future Of Technology
Author: jagpreet

4. Predictive Maintenance Market Set To Surge To $79.1 Billion By 2032
Author: Rutuja kadam

5. Why Every Business Needs A Custom Mobile App In The Digital Age
Author: Miachael Williams

6. Building A Strong Foundation: Beginner Programming Courses For Young Learners
Author: stem-xpert

7. How Web Design Chicago Is Revolutionizing The User Experience For Businesses
Author: Tim Harrison

8. Best It Courses | Which Course In It Is Best?
Author: Kodestree

9. Uv Stabilizers Market Poised To Hit $1.90 Billion By 2032: Growth Trends & Insights
Author: Rutuja Kadam

10. The Ultimate Guide To Choosing The Best Cross-platform App Development Company For Your Business Success
Author: Siddharth

11. Stand-up Pouches Market To Be Worth $52.1 Billion By 2032
Author: Rutuja Kadam

12. Top Full Stack Development Services For Web And Mobile Apps In 2025
Author: jonathan

13. Revolutionize Your Online Presence With Cutting-edge Web Development!
Author: Hitvanshi

14. Top 10 Ibm I Service Providers Right Now
Author: Siddhant Saxena

15. How Mobile Applications Helps Local Businesses Grow?
Author: Ritesh Sharma

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: