• Home
  • Computer Security Threats

Computer Security Threats

A computer threat can cause a serious harm to the system’s security. A threat can be either intentional or accidental. A threat can be due to an individual hacker or a criminal organization. An accidental threat may be due to the possibility of a computer malfunction or a natural disaster such as an earthquake or a fire. Users and data entry clerks frequently make errors which may directly or indirectly result in security problems. In certain cases, an error that occurs in the system can cause a threat such as a data entry problem or programming problem. These problems could crash a system.

Computer Security Threats


Types of computer security threats

  • The Computer virus is a program that changes the operational method of a system without the permission of the user.
  • (Hackers, Viruses, Spyware, Adware, Phishing, Worms, Spam, Botnets, Rootkits, DOS Attacks)
  • Spyware is a program that checks your online activities or installs programs without user authentication .
  • Hackers are programmers who access the systems without the knowledge of the system owner .
  • Predator Hackers steal your credit card details , lock your data, and steal your identity.
  • Phishing is at type of security threat which steals sensitive financial or personal information through email messages.
  • Worm is also a kind of threat that attacks the network and application layers, they spreads through a network.
  • Adware is a software installed as a part of another program. When users visit a website which contains malicious codes. The Adware loads and installs automatically.
  • Spam is received as an email, it may contain a malicious file which is attached to it .
  • Rootkits is a tool used by a third party service to maintain control of the system operation without being detected.
  • DOS attack uses a machine to attack one system or network.

what are the computer security threats that can damage your computer in the process

All types of threats damage your system in the process. If a virus attacks the system, it deletes information on the system. A virus attaches itself automatically to the operating system and uses all the system resources. It mainly attacks the application layer. Certain viruses consumes all the system resources during its replication.

what is security threats in computer networks

Secure your information by protecting all components of the system, data, software, hardware and networks. Network security refers to the protection of data during their transmission process and to assure that the transmissions is authentic. There are two types of threats- Passive and Active threats. Passive threats refer to eavesdropping the information related to communication. Active threats are caused by hackers who create changes on the computer data.

what is external threats to computer security

A security threat always causes a huge financial loss to a company and leaks confidential information. One of the most common problem encountered by companies data breaches. This type of issue can be due to internal and external threats. The various sources of external threats are criminal syndicates, and hacktivists.

Examples of threats that can compromise computer security

(Natural Threats, Intentional Threats, Unintentional Threats)

  • Natural Threats- These threats are caused by Mother Nature- floods, storms, hurricanes.
  • Intentional threats- When a third user intentionally damages the property or information.
  • Unintentional threats- Unauthorized or accidental modification of software. In some cases , accidental deletion of an important file.

web browsing can expose your computer to which two security threats

  • Spyware installed on the target monitors every action and reports it to the remote attacker.
  • Ransomeware is a malicious software that restricts access to the system files and folders. This threat demands the user for a ransom amount.

Following utilities protect your computer from security threats

(KeePass, Password Safe, Sticky Password, BestCrypt, TrueCrypt, FreeOTFE, SISWG IEEE P1619 standard)

  • KeePass is a free open source program which provides lots of tools and options for a secure Web password.
  • PassWord Safe contains an import feature which requires XML or CSV format to set a password.
  • The Sticky Password is a paid application and has the best browser integration features for a wide range of browsers.
  • BestCrypt is an encryption package which classifies all users into groups. All users have different passcodes.
  • TrueCrypt is an open source software which is designed to keep data secure and by providing a key for data stored.
  • FreeOTFE is available in portable mode, if you are unable to install a software. No drivers are required for installation.
  • SISWG IEEE P1619 standard is to provide speed and resistance to attack tweaking data.

sources of computer security threats

(impersonating an authorized user, Denial of service to data, deliberate modification)

  • Performing an unauthorized access of data or system using a software or use of an unauthorized user.
  • Denial of service is a type of attack where attackers avoid the legitimate users from accessing the system.
  • Loss of data due to natural calamities such as earthquakes and other deliberate modification.

Latest computer security threats

  • Organised cyber crime syndicates engage in hacking and cyber attacks. Fully functional or multi-level organizations involve in creating malware and other threats .
  • Small time cons involves one or more activities such as identity theft, breaking passwords and extrude credit card.
  • Intellectual property theft and corporate espionage Hackers intrude into an organisation’s IT assets to steal confidential information about patents, emails, etc.
  • Malware mercenaries – A programmer would make malware for his or her use. The sole aim of the programmer is to intrude into specific security defenses.
  • Botnets as a service- Botnet is a malicious program that is created by a programmer to control all systems connected to the server. It is used as a service to control unknown systems.
  • All-in-one malware- Sophisticated malware programs not only effects the end-user but also intrudes into websites and make changes that infect more victims.
  • The increasingly compromised web- Most websites or webmasters contain poor passwords, vulnerable software and insecure permissions. All these instances can easily bypass admin authentication.
  • Cyber warfare- Data breaches are done by competing firms, governments on firms, cyber syndicates with the help of a complex program.

computer security threats and vulnerabilities

Computer security threats refer to persons and entities to initiate a threat. Vulnerabilities can also be the weakness in a system. One type of vulnerability is the SQL injection vulnerability, which provides control over sensitive data. Make use of these preventive measures to reduce the system’s vulnerability. Scroll down to the page to get more information about the issue.

computer security threats and solutions

Computer security is one of the growing issues among the various organizations. Certain preventive measures of the threats are installing anti-virus software and keep them up-to-date. Use a firewall software to protect networks. Filter the incoming and outgoing email for the computer virus. Do not run programs from unauthorized users. Creating a back up of confidential data is the main measures.

How to prevent computer security threats

(Security Policy First, Don’t Neglect Physical Security, Screen New Hires, Use Strong Authentication, Secure Your Desktops, Segment LANs, Plug Information Leaks, Investigate Anomalous Activities, Refocus Perimeter Tools and Strategies, Monitor for Misuse)

  • Use a security policy to prevent and detect misuse of information. It should also convey the potential after effects of misuse.
  • Usage of two-factor authentication or biometric authentication to avoid the security threats.
  • Investigate an applicant’s background details or double-check it when outsourcing.
  • Password cracking technology is advanced and can hack stronger passwords. Use advanced technical tools to resolve this issue.
  • Group Policies permit a security manager to fix configuration details for the operating system and its components.
  • Network based intrusion detection systems play a prominent role on internal defenses.
  • Confidential information may leak through email, printed copies, and instant messaging. Combine the security policy and technology to avoid leakage .
  • Use the perimeter tools inside of the network to increase your security.
  • Security may require direct employee monitoring from video cameras to the login process.
  • Collect log data from your Internet facing servers- Windows event logs, firewall logs, IDS alerts.

How to manage computer security threats

  • When you move out of your working place, do not leave the windows or system open, lock it.
  • (not leaving the windows open, installing security software).

  • Install a third party security software in your system that manages the system security.

How to protect your computer from internet security threats

  • Update all the installed applications such as anti-virus, and anti-spam programs at the host-level.
  • Embrace security by obscurity- Rename the admin credentials and root accounts.
  • Check if anyone is scanning or listening to the communication between the TCP/UDP ports on your network.
  • Check the browsing history on a real-time online report that is accessible by anyone.
  • Automate security- Enable the Automatic option on the firewall security setting for an automatic update.
  • Educate staff and employees about security risks- Create an awareness for staffs and employees regarding the security policies and procedures.

Enumerate the ways on how to safeguard computer network against security threats

(Prevent the installation or execution of unauthorized software, don’t let non-admin users be logged in as administrators or root, Secure your e-mail, Secure your passwords, Practice deny-by-default and least-privilege whenever possible, define and enforce security domains, encrypt all confidential data whenever possible)

  • Prevent the installation or execution of unauthorized software- check what is installed on your system and what is the purpose of it.
  • Don’t let non-admin users be logged in as administrators or root- Do not allow a third person to know the admin credentials.
  • Secure your e-mail- Change the HTML content into plain text. Block all file extensions by default.
  • Secure your passwords- Use passwords with a combination of alphabets, numbers and characters. Use 10 to 15 characters for your password.
  • Practice deny-by-default and least-privilege whenever possible- Developing the least privilege security policies. Use IT security groups to secure your data.
  • Define and enforce security domains- Check the login access and its responsibilities and types of legitimate traffic.
  • Encrypt all confidential data whenever possible- For portable computers and media, encryption is mandatory.

Call us