What Is Computer Security? What Are The Types Of Computer Security Threat?

Share It On:

Many people aren’t aware of the cyber threats lurking on the World Wide Web, i.e., internet. Stories of only high profile celebrities, politicians, big companies, etc. are made but have you ever thought of what would happen if all your credential information like username, password, credit card number, financial transactions, etc. is leaked from the internet. There is no imagination how devastating destruction occurs in each life. So Cybersecurity, Computer Security or IT Security are today’s need to protect our confidential data and information from the eavesdropper, hacker, etc.

Computer Security or IT Security is a global demand to protect our computer systems from the malicious attackers from doing any damage to our hardware, software as well as disruption of the services provided. So Computer Security involves controlling our physical access as well as protecting against the harm that occurs via network access, data, and code injection.

Attackers often think ahead than a problem solver so always keep in mind that they are frequently trying or using different attacking techniques and methods we may not be aware of to discover our confidential personal or business information. So we have to be mindful of these facts by being extra vigilant when online. Then only, secureness of our information becomes possible from our site.

There are several types of computer security threat in modern time; a few of them are mentioned here:

  1. Trojan Horse

Trojan horse is a malicious program, attached with the application that users thought legitimate but actually, it is malicious. Once a Trojan horse embedded application has been downloaded in your computer, a Trojan horse can do anything from record your confidential passwords by logging keystrokes known as a Keystroke logger to hijacking your web camera to watch and record your whole movement in business. The most popular banking threats come from the Trojan horse family are Zeus and Spy Eye.

  1. Backdoor

Backdoor is not a Malware, but it is a process of generating a secret path or method by an eavesdropper to bypass all the regular authentication services.

  1. Denial of service attacks

A distributed denial-of-service attack occurs when a malicious user gets a network of zombie computers to sabotage a particular website or server. The attack occurs when the malicious user tells all the zombie computers to link with specific site or server frequently that increases the volume of traffic overloads and results with shut down of website or server.

  1. Botnet

A Botnet is a group of computers or software robots or bots creates a battalion of infected computers known as Zombies when get connected to the internet by the originator. The originator remotely controls them. It can spread all types of malware, send spam emails with viruses attached, use one computer to infect others, etc.

  1. Wabbits

It is a self-replicating threat not like a virus or worms. It does not harm the computer system like a Virus so does not replicate like a worm. An example of Wabbits attack is the fork bomb.

  1. Hacking

A very great term for the security breach is hacking; it is an action taken by some anonymous to gain unauthorized access to a computer. Hackers find weaknesses in our security settings to access our information, install a Trojan horse for creating a backdoor to discover our confidential information. There is even more attack you can search for like Direct-access attacks, Eavesdropping, Spoofing, Tampering, Privilege escalation, Phishing, Clickjacking, Social Engineering, Virus, Worms, Spyware, Scareware, Adware, Exploit, Dialer, Dropper, Fake AV, Bluejacking, Boot Sector Virus, etc.


Share It On:

Recent Posts

NRB’s NPR 6.8 Billion Investment: Strengthening Nepal’s Financial Future and Banking Stability

NRB’s NPR 6.8 Billion Investment: Strengthening Nepal’s Financial Future and

Share It On:23rd November 2024, Kathmandu Nepal’s Central Bank, Nepal Rastra Bank (NRB), has announced a significant investment of NPR

Nepal’s ADB Prioritizes Farmers’ Welfare for Economic Growth and Agricultural Development

Nepal’s ADB Prioritizes Farmers’ Welfare for Economic Growth and Agricultural

Share It On: 23rd November 2024, Kathmandu The Agricultural Development Bank (ADB) is recognized as a vital institution for Nepal’s

Ridi Power’s 23rd AGM Concludes: Key Decisions, Investments, and Future Outlook

Ridi Power’s 23rd AGM Concludes: Key Decisions, Investments, and Future

Share It On: 23rd November 2024, Kathmandu Ridi Power Company Limited wrapped up its annual shareholder meeting, the 23rd Annual

Nepal Oman Financial Ties Strengthen: Omani Rial Now Legal Tender In Nepal

Nepal Oman Financial Ties Strengthen: Omani Rial Now Legal Tender

Share It On: 22nd November 2024, Kathmandu A significant step has been taken towards strengthening financial ties between Nepal and

Liberty Energy Rights Shares Offering: Eligibility, Application Process, and Future Plans

Liberty Energy Rights Shares Offering: Eligibility, Application Process, and Future

Share It On:22nd November 2024, Kathmandu Liberty Energy Company Limited is gearing up to issue rights shares starting December 1,

Asha Laghubitta’s 8th AGM 2024: Key Decisions and Future Plans

Asha Laghubitta’s 8th AGM 2024: Key Decisions and Future Plans

Share It On:22nd November 2024, Kathmandu Asha Laghubitta Bittiya Sanstha is holding its 8th Annual General Meeting (AGM) today, November