0% found this document useful (0 votes)
14 views2 pages

Understanding various threat to computer

Uploaded by

Jatin Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

Understanding various threat to computer

Uploaded by

Jatin Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Understanding various threat to computer

A threat to a compute is any event that could compromise the security, integrity, or availability
of the computer system, its data, or its users.
Types of threat to computer
Threat to computer can be physical threat as well as Non-physical threats
Physical Threats
Physical threat to computer systems is a potential cause of an occurrence/event that could
result in data loss or physical damage. It can be classified as:
 Internal: Short circuit, fire, non-stable supply of power, hardware failure due to excess
humidity, etc. cause it.
 External: Disasters such as floods, earthquakes, landscapes, etc. cause it.
 Human: Destroying of infrastructure and/or hardware, thefts, disruption, and
unintentional/intentional errors are among the threats.
Non-physical threats:
A non-physical threat is a potential source of an incident that does not involve physical .It could
compromise computer systems, data and user identities. It can be classified as:
Malware:
Malicious software that can disrupt computer operations, gain access to a computer system, or
gather sensitive information. Examples include viruses and worms.
Virus: It is a program that replicates itself and infects your computer’s files and programs,
rendering them inoperable. It is a type of malware that spreads by inserting a copy of itself
into and becoming part of another program.
Worms: A worm is a malicious computer program that replicates itself usually over a computer
network without user interaction.
Trojan: A Trojan, also known as a Trojan horse, is a type of malicious software (malware) that
disguises itself as legitimate software. Once installed, a Trojan can allow an attacker to access
the infected computer, steal sensitive information, or use the computer for malicious activities.
Spyware is a type of malicious software (malware) that secretly monitors and collects personal
information about a computer user, often without their knowledge or consent.
Adware is a type of malicious software (malware) that displays unwanted advertisements on a
computer or mobile device.
Key loggers: A key logger, also known as a keystroke logger, is a type of malicious software
(malware) that records every keystroke made on a computer or mobile device. This allows an
attacker to capture sensitive information, such as: passwords, credits card number, PIN.
Root kit: A root kit is a type of malicious software (malware) that hides itself and other malware
from the operating system, making it difficult to detect and remove. Root kits can provide
unauthorized access to a computer system, allowing attackers to Steal sensitive information,
Install additional malware, Manipulate system settings, Hide malicious activity, Gain
administrative privileges
Phishing: Phishing is a technique of extracting confidential information from the bank/financial
institutional account holders by illegal ways.
Hacking: Hacking refers to the unauthorized access, use, disclosure, disruption, modification, or
destruction of computer systems, networks, or electronic data
Cracking:Cracking refers to the unauthorized access or manipulation of computer systems,
networks, or data

You might also like