Threats arise from the existence of vulnerabilities, that is, a threat can only exist if a vulnerability exists that can be exploited, regardless of whether the security of a computer system is compromised or not.
In recent years the increase in intentional threats is due to the lack of awareness of users in the use of technology, the increase in social engineering techniques, the lack of training and the increasing profitability of cyber attacks .
Intentional, in the event that deliberate attempts are made to produce damage (for example, the theft of information by applying the trashing technique, the propagation of malicious code and social engineering techniques).
Unintentional, where there are actions or omissions of actions that while not seeking to exploit a vulnerability, put information assets at risk and may cause harm (for example, threats related to natural phenomena).
In the security of a computer or some technological device, threats to those that affect the functioning of the systems must be considered. Some threats of this type are such as spyware, trojans, worms, even hackers, etc.
These threats are divided into 2 types:
This type of computer threats are, generally, more severe than all those that may come from abroad since users know the network and know how it works, have some level of access to the network, IPS and Firewalls are ineffective mechanisms in internal threats; so if someone inside a company wanted to make an attack the result would be severe.
They are those threats that originate from outside the network. By not having accurate information of the internal network of the company, the attacker has to take certain steps to know what is in it and find a way to attack it. The good news in this type of computer threats is that they can be avoided from within the company if you have the correct security measures.
Among the external computer threats includes:
It is a program that is automatically copied and that is intended to alter the normal functioning of the computer, without the user's permission. Viruses are programs that replicate and run on their own, usually replacing executable files with others infected with the virus code.
A worm is a computer virus that has the property of duplicating itself. Worms use the automatic parts of an operating system that are generally invisible to the user.
The spyware is an application that collects valuable information from a person or organization without your knowledge.
It is called Trojan, a malicious program that can be hosted on computers and allow access to external users, through a local network or the Internet, to collect information or control the computer remotely.
A hacker is an alien user who enters into your computer with intentions to steal information and cause damage (such as spyware). The difference between a spyware and a hacker is that, in the second case, we are talking about a person who, through their knowledge, breaks the barriers that come in their way to enter a site or a computer.
We hope this information has been useful and you can know more about what can infect your computer or your mobile devices.1553787120