What Types Of Computer Security Threats Systems In ( 2020 )

Spread the love

A computing system threat is anything that results in loss or corruption of knowledge or physical damage to the hardware and/or infrastructure. Knowing the way to identify computer security threats is the initiative in protecting computer systems. The threats might be intentional, accidental or caused by natural disasters.

In this article, we’ll introduce you to the What Types Of Computer Security Threats Systems and the way you’ll protect systems against them. 

 

What is a Security Threat?

Security Threat is defined as a risk that may potentially harm computer systems and organization. The cause might be physical like someone stealing a computer that contains vital data. The cause could even be non-physical like an epidemic attack. In these tutorial series, we’ll define a threat as a possible attack from a hacker which will allow them to realize unauthorized access to a computing system. 

What Types Of Computer Security Threats Systems In ( 2020 )

 

What Are Physical Threats?

A physical threat may be a potential explanation for an event which will end in loss or physical damage to the PC systems.

The following list classifies the physical threats into three (3) main categories;

  • Internal: The threats include fire, unstable power supply, humidity within the rooms housing the hardware, etc.
  • External: These threats include Lightning, floods, earthquakes, etc
  • Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

To protect computer systems from the above mentioned physical threats, a corporation must have physical security control measures.

The following list shows a number of the possible measures which will be taken:

Internal: Fire hazards can be prevented by using automatic fire detectors and fire extinguishers that do not use water to keep the fireplace. The unstable power supply is often prevented by the utilization of voltage controllers. Air conditioning often wants to control the humidity within the computer room.

External: Lightning protection systems are often wont to protect computer systems against such attacks. Lightning protection systems aren’t 100% perfect, but to a particular extent, they reduce the probabilities of Lightning causing damage. Housing computer systems in high lands are one among the possible ways of protecting systems against floods.

Humans: Threats such as theft are often prevented by using locked doors and restricting access to computer rooms.

 

What Are Non-Physical Threats?

A non-physical threat may be a potential explanation for an event which will result in;

  • Loss or corruption of system data
  • Disrupt business operations that believe computer systems
  • Loss of sensitive information
  • Illegal monitoring of activities on computer systems
  • Cyber Security Breaches
  • Others

The non-physical threats also are referred to as logical threats. The subsequent list is that the common sorts of non-physical threats;

  •  Virus
  •  Trojans
  •  Worms
  •  Spyware
  •  Keyloggers
  •  Adware
  •  Denial of Service Attacks
  •  Distributed Denial of Service Attacks
  •  Unauthorized access to computer systems resources like data
  •  Phishing
  •  Other Computer Security Risks

To protect computer systems from the above-mentioned threats, a corporation must have logical security measures in situ. The next list looks at various possible steps to protect against cyber security threats.

To protect against viruses, Trojans, worms, etc. a corporation can use anti-virus software. In addition to the anti-virus software, a corporation also can have control measures on the usage of auxiliary storage devices and visiting the web site that’s presumably to download unauthorized programs onto the user’s computer.

Unauthorized access to computer resources is often prevented by the use of authentication methods. The authentication methods are often, within the sort of user ids and powerful passwords, smart cards or bio metric, etc.

Intrusion-detection/prevention systems are often wont to protect against denial of service attacks. There are other measures too which will be put in situ to avoid denial of service attacks.

 

Summary

  • A threat is any activity which will cause data loss/corruption through to disruption of normal business operations.
  • There are physical and non-physical threats.
  • Physical threats cause damage to computer systems hardware and infrastructure. Examples include theft, vandalism through to natural disasters.
  • Non-physical threats target the software and data on the PC systems.

If You Want To Learn What is Hacking In (2020)

Thank You For READ Our Article 🙂


Spread the love

Leave a Reply