What are the different threats for your computer security?
The various threats to security of the computer include threats that attack not only computer hardware but also software. These threats affect the normal functioning of the computer and can either lead to failure, data loss, monitoring or loss of sensitive information. Things such as computer viruses, Trojan horse, spyware, adware and ruthless characters are also a source of threats for the computer. Some of the threats to security of the computer are the result of accidents or negligence.
In addition to the physical threats for security of the computer, other types of threats are more insidious. An example is a computer virus that is a malicious program created by those who have poor intentions to negatively change the functioning of the computer without the consent of the computer owner. Normally, these viruses find a way to a computer where they are excluded within various files, such as program program or other documents. These can remain sleeping until something reflects them. Once the virus is activated, it will cause considerable damage to the computer system by damaging files andTheir unusable, clear all information on the hard disk and also accidentally display pre -programmed messages.
Other types of non -physical threats for computer security include a Trojan horse, a cunning program that seems to provide a kind of advantage and at the same time serves a more ominous purpose. The purpose could be to give a hacker access to a computer or change or damage certain files on your computer. Examples of these types of threats are unsolicited e -mail and viral links.
Adware and spyware are physical threats to security of the computer that are secretly installed on a user's computer with the intention of monitoring the use of the Internet user. Some of the monitor things are types of websites that users, types of books or music that the user downloads and other things, such as the kind of things that the user orders over the Internet. Sometimes show some types of ads that are adaptedBeny users based on user activity analysis on the Internet.
Some criminal elements troll the Internet in finding flawless people on which prey is needed. They can send fake letters that claim to be someone who should not get an e -mail address, people's passwords and other types of personal data. The purpose of this is to allow them to obtain unauthorized access to an individual's computer with the intention of stealing identity, money or other information. Then there are threats for computers simply from the negligence of owners. Such threats may include water leaks on computers and power surge that can affect the computer's infrastructure.