Saturday, July 4, 2020
Home Ethical Hacking Potential Security Threats To Your Computer

Potential Security Threats To Your Computer

Potential Security Threats To Your Computer Systems

Virus

computer system threat is anything that results in loss or corruption of knowledge or physical damage to the hardware and/or infrastructure. Knowing the way to identify computer security threats is that the initiative in protecting computer systems. The threats might be intentional, accidental or caused by natural disasters.

In this article, we’ll introduce you to the common computing system threats and the way you’ll protect systems against them.

Topics covered during this tutorial
What is a Security Threat?
What are Physical Threats?
What are Non-physical Threats?
What is a Security Threat?
Security Threat is defined as a risk that which may potentially harm computer systems and organization. The cause might be physical like someone stealing a computer that contains vital data. The cause could even be non-physical like an epidemic attack. In these tutorial series, we’ll define a threat as a possible attack from a hacker which will allow them to realize unauthorized access to a computing system .

Potential Security Threats To Your Computer Systems

What are Physical Threats?
A physical threat may be a potential explanation for an event which will end in loss or physical damage to the pc systems.

The following list classifies the physical threats into three (3) main categories;

Internal: The threats include fire, unstable power supply, humidity within the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, a corporation must have physical security control measures.

The following list shows a number of the possible measures which will be taken:

Internal: Fire threats might be prevented by the utilization of automatic fire detectors and extinguishers that don’t use water to place out a fireplace . The unstable power supply are often prevented by the utilization of voltage controllers. An air conditioning are often wont to control the humidity within the computer room.
External: Lightning protection systems are often wont to protect computer systems against such attacks. Lightning protection systems aren’t 100% perfect, but to a particular extent, they reduce the probabilities of Lightning causing damage. Housing computer systems in high lands are one among the possible ways of protecting systems against floods.
Humans: Threats like theft are often prevented by use of locked doors and restricted access to computer rooms.
What are Non-physical threats?
A non-physical threat may be a potential explanation for an event which will result in;

Loss or corruption of system data
Disrupt business operations that believe computer systems
Loss of sensitive information
Illegal monitoring of activities on computer systems
Cyber Security Breaches
Others
The non-physical threats also are referred to as logical threats. the subsequent list is that the common sorts of non-physical threats;

Virus
Trojans
Worms
Spyware
Key loggers
Adware
Denial of Service Attacks
Distributed Denial of Service Attacks
Unauthorized access to computer systems resources like data
Phishing
Other Computer Security Risks
To protect computer systems from the above-mentioned threats, a corporation must have logical security measures in situ . the subsequent list shows a number of the possible measures which will be taken to guard cyber security threats

To protect against viruses, Trojans, worms, etc. a corporation can use anti-virus software. In additional to the anti-virus software, a corporation also can have control measures on the usage of auxiliary storage devices and visiting the web site that’s presumably to download unauthorized programs onto the user’s computer.

Unauthorized access to computing system resources are often prevented by the utilization of authentication methods. The authentication methods are often , within the sort of user ids and powerful passwords, smart cards or biometric, etc.

Intrusion-detection/prevention systems are often wont to protect against denial of service attacks.There are other measures too which will be put in situ to avoid denial of service attacks.

Summary
A threat is any activity which will cause data loss/corruption through to disruption of normal business operations.
There are physical and non-physical threats
Physical threats cause damage to computer systems hardware and infrastructure. Examples include theft, vandalism through to natural disasters.
Non-physical threats target the software and data on the pc systems.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Raspberry Pi | Hackers True Love

Raspberry Pi is a very good and useful device for aspiring hackers.who want  a portable and powerfull device for hacking. What is Raspberry Pi ? The...

Social Engineering: How to become a Dark Art Artisan

Social Engineering: How to become a Dark Art Artisan Therefore, his program director forced him to take a course he did not want to do....

7 Excellent Websites for Checking Google Keyword Rankings

7 Excellent Websites for Checking Google Keyword Rankings 7 accurate and modern Google status verification tools: Semrush AccuRanker Ahrefs SERPWatcher Google Rank Checker SERP Keyword Ranking Verifier SEOC within corrective range 1. Semersh Google...

WHAT IS SOCIAL ENGINEERING? ATTACKS, TECHNIQUES & PREVENTION

What is Social Engineering? Attacks, Techniques & Prevention What is social engineering? Social engineering is the art of tampering with the users of a computer system...

Recent Comments