Potential Security Threats To Your Computer Systems

Computer system threats encompass any factors that result in the loss, corruption, or physical harm to data, hardware, and infrastructure. The initial step in safeguarding computer systems involves the ability to recognize these threats. They may arise from deliberate actions, unintended incidents, or natural calamities. A security threat refers to a potential danger that can adversely impact computer systems and organizations. The source of these threats could be tangible, such as the theft of a computer containing vital information, or intangible, like a virus attack. Throughout this series of tutorials, we will define a threat as a potential assault by a hacker, enabling them to gain unauthorized entry to a computer system.

Within this article, we will provide an overview of the prevalent computer system threats and outline methods for safeguarding systems against them.

What are Physical Threats?

A physical threat refers to a potential factor that can lead to incidents causing loss or physical harm to computer systems.

The physical threats can be categorized into three main categories as follows:

  1. Internal threats: These encompass risks such as fire, unstable power supply, high humidity levels in the rooms where hardware is stored, and so on.
  2. External threats: These comprise dangers like lightning strikes, floods, earthquakes, and other natural phenomena.
  3. Human threats: These involve risks associated with theft, vandalism of infrastructure or hardware, disruptions caused by individuals, as well as accidental or intentional errors.

In order to safeguard computer systems from the aforementioned physical threats, organizations must implement physical security control measures. The following list presents potential measures that can be implemented:

  • Internal: To mitigate fire threats, organizations can employ automatic fire detectors and non-water-based extinguishers. Unstable power supply can be addressed through the use of voltage controllers. Controlling humidity in computer rooms can be achieved by utilizing air conditioning systems.
  • External: Lightning protection systems can be implemented to safeguard computer systems against lightning strikes. While these systems are not foolproof, they can significantly reduce the risk of damage. Additionally, situating computer systems in elevated areas can help protect them from floods
  • Humans: Measures such as locked doors and restricted access to computer rooms can prevent theft and vandalism.

Now, let’s discuss non-physical threats.

Non-physical threats, also known as logical threats, are potential causes of incidents that can result in various outcomes, including data loss or corruption, disruption of business operations relying on computer systems, loss of sensitive information, illegal monitoring of computer system activities, cyber security breaches, and more.

The following list outlines common types of non-physical threats:

  • Viruses
  • Trojans
  • Worms
  • Spyware
  • Keyloggers
  • Adware
  • Denial of Service (DoS) attacks
  • Distributed Denial of Service (DDoS) attacks
  • Unauthorized access to computer system resources, such as data
  • Phishing
  • Other computer security risks

To protect computer systems from these threats, organizations must implement logical security measures. The following list suggests possible measures to enhance cybersecurity:

  • Utilize anti-virus software to protect against viruses, Trojans, worms, etc.
  • Implement controls on the usage of external storage devices and restrict access to potentially unsafe websites.
  • Employ authentication methods, such as strong passwords, user IDs, smart cards, or biometric authentication, to prevent unauthorized access to computer system resources.
  • Implement intrusion detection/prevention systems to mitigate denial of service attacks. Other measures can also be implemented to mitigate such attacks.