Security Threats To Your Computer Systems

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.

In this article, we will introduce you to the common computer system threats and how you can protect systems against them.

 

What is a Security Threat?

Security Threat is defined as a risk that which can potentially harm computer systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.

Potential Security Threats To Your Computer Systems

What are Physical Threats?

A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.

The following list classifies the physical threats into three (3) main categories;

  • Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
  • External: These threats include Lightning, floods, earthquakes, etc.
  • Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.

The following list shows some of the possible measures that can be taken:

  • Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
  • External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
  • Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.

What are Non-physical threats?

A non-physical threat is a potential cause of an incident that may result in;

  • Loss or corruption of system data
  • Disrupt business operations that rely on computer systems
  • Loss of sensitive information
  • Illegal monitoring of activities on computer systems
  • Cyber Security Breaches
  • Others

The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;

  • Virus
  • Trojans
  • Worms
  • Spyware
  • Key loggers
  • Adware
  • Denial of Service Attacks
  • Distributed Denial of Service Attacks
  • Unauthorized access to computer systems resources such as data
  • Phishing
  • Other Computer Security Risks

To protect computer systems from the above-mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken to protect cyber security threats

To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the user’s computer.

Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.

Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid denial of service attacks.

Summary

  • A threat is any activity that can lead to data loss/corruption through to disruption of normal business operations.
  • There are physical and non-physical threats
  • Physical threats cause damage to computer systems hardware and infrastructure. Examples include theft, vandalism through to natural disasters.
  • Non-physical threats target the software and data on the computer systems.

 

 

Tags :(Just Ignore)

2 examples of man made threats to computers,3 main physical threats to computer systems,3 threats to a computer,3 threats to a computer system,3 types of security threats to computers,5 threats to computers and communications systems,biggest threats to computer security,common threats to computer data,common threats to computer information system,common threats to computer security,common threats to your computer,computer generated threats to schools,computer threats to business,current threats to computer security,cyber threats to computer,describe threats to a computer network,different threats to computer security,different types of threats to computer,environmental threats to computer systems,explain the threats to computer,explain the various threats to computer security,external threats to computer networks,external threats to computer security,external threats to computer systems,general threats to computer networks,how to detect computer threats,how to manage computer threats,how to minimize computer threats,how to mitigate computer threats,how to prevent threats to computer,how to remove computer threats,human threats to computer systems,identify natural threats to your computer,internal and external threats to computer security,internal threats to a computer system,internal threats to computer data,internal threats to computer security,latest threats to computer security,list internal threats to computer data,list of threats to computer security,list of threats to computer systems,major security threats to computer systems,major threats to computer security,man made threats to computer,monitor threats to a computer network,one of the biggest threats to your computer is malware,physical threats to computer data,physical threats to computer networks,physical threats to computer security,physical threats to computer systems,physical threats to your computer,potential threats to computer networks,security threats related to computer,security threats related to computer crime,security threats to computer users,security threats to my computer,security threats to networked computer system,security threats to your computer,threats and hazards to computer data,threats and vulnerabilities to computer systems,threats for computer,threats for computer security,threats for computer systems,threats from computer viruses,threats in computer science,threats in computer security,threats in computer security pdf,threats in computer system design,threats of computer,threats of computer crime,threats of computer hacking,threats of computer hardware,threats of computer security,threats of computer system,threats of computer technology,threats of computer virus,threats of computer viruses,threats of computer worms,threats that computer viruses can pose,threats to a computer,threats to a computer network,threats to a computerized accounting system,threats to a personal computer,threats to computer,threats to computer and communication system,threats to computer and information security,threats to computer and network security,threats to computer and network security ppt,threats to computer and users,threats to computer applications,threats to computer based information system,threats to computer data,threats to computer files,threats to computer hardware,threats to computer hardware and software,threats to computer information,threats to computer information system,threats to computer network,threats to computer network security,threats to computer networks,threats to computer pdf,threats to computer ppt,threats to computer privacy,threats to computer processing,threats to computer security,threats to computer security pdf,threats to computer security ppt,threats to computer software,threats to computer system,threats to computer system ppt,threats to computer systems and control measures,threats to computer systems and controls,threats to computer systems in a school setup,threats to computer users,threats to computerized accounting systems,threats to computers pdf,threats to home computer security,threats to my computer,threats to the computer,threats to the computer security,threats to the computer system,threats to your computer,threats to your computer on the internet,top 10 threats to computer security,top 10 threats to computer systems,two primary threats to computer systems,types of threats to computer network,types of threats to computer system,types of threats to computer system and control measures,types of threats to computer users,various threats to computer,various threats to computer network,various threats to computer security,various threats to computer system,various types of threats to computer system,what are internal threats to computer security,what are some threats to computer networks,what are some threats to your computer,what are the threats to computer hardware,what are the threats to computer users,what are threats to computer security,what are threats to computer systems,what is external threats to computer security,what is threats to computer

Leave a Reply

Your email address will not be published. Required fields are marked *