Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What Are the Different Types of Computer Security Risks?

G. Wiesen
G. Wiesen

There are many different types of computer security risks that a company or individual computer user should be aware of, though most of them can be categorized as either external or internal threats. External threats are those that come from outside of a system, such as a hacker who attacks a company that he or she has no other contact with, or the dissemination of a virus or other malware through a computer system. Internal security risks are those that come from within a company or system, such as an employee stealing information from a company or carelessness that leads to data theft.

Some of the most damaging and dangerous types of computer security risks are those that come from outside of a system. A large corporation, for example, might maintain a number of servers for data storage and hosting of company websites and other materials. Hackers from outside of that company can attack those systems through a variety of methods, typically meant to disrupt activities or obtain information. These attacks can result in a great deal of loss due to lost productivity, disruption of customer interactions, and data theft.

Antivirus and other security software can help reduce the chances of a computer being infected by a virus or other malware.
Antivirus and other security software can help reduce the chances of a computer being infected by a virus or other malware.

There are also a number of untargeted security risks that can come from external sources. While a hacker may need to target and attack a particular company or server, viruses and other malicious software can enter a system without the knowledge of company employees. These risks are ever present and should be defended against by a company or personal computer user to ensure resources are not lost or compromised for future attacks.

Key logging software is used to record a user's keystrokes.
Key logging software is used to record a user's keystrokes.

Internal computer security risks can be just as dangerous to a company, and may be even more difficult to locate or protect against. Disgruntled former or current employees, for example, may leak information online regarding the company's security or computer system. This can give external attackers, such as hackers, inside information to more easily penetrate a system and cause damage. Protection against this type of behavior often requires careful procedures for hiring security personnel and system updates following employee termination.

Physical theft is a type of computer security risk.
Physical theft is a type of computer security risk.

Other internal computer security risks can arise due to carelessness, which may result in severe consequences. A corporate officer, for example, might forget his or her laptop that contains private information on a public airplane upon disembarking. If someone else finds this laptop, then he or she may be able to use the information on it to steal identities or otherwise cause harm to a company or private individuals. These types of computer security risks are unpredictable and can only be avoided through the education of employees and company officers in safe computer practices.

Discussion Comments

mobilian33

@Laotionne - You really shouldn't open any email that is sent from someone you don't recognize anyway. Whether you are at work or at home, one of the easiest ways to get your computer infected is through email messages.

Laotionne

I'm afraid to open emails at work since I saw a commercial where this lady opens an email at work and it turns out to be a virus. When she opens the email the virus attacks the entire system and shuts down all of the computers in the office. I no longer open any email at work that I don't recognize, unless I check with the IT guy first.

Sporkasia

@Animandel - I agree that computer systems are not 100 percent safe, but carrying cash can be a risk, too. One of the reasons I stopped paying with cash is because I don't like carrying a lot of cash. Cards are also more convenient, but no matter how you choose to pay there are risks involved.

I am not at the point that I feel computer systems are so unsafe that I am going to stop using computers or stop using my online banking. This day may come, but I'm not there yet.

Animandel

I used to think that the computer security of companies had nothing to do with me. Then I began reading more news articles and seeing TV news programs about how hackers are breaking into the computer systems of companies and taking information about the customers of the companies.

How scary is it that hackers are stealing your personal information such as your address and your bank card numbers? This makes me think twice about using bank cards when I make a purchase.

Post your comments
Login:
Forgot password?
Register:
    • Antivirus and other security software can help reduce the chances of a computer being infected by a virus or other malware.
      By: alexskopje
      Antivirus and other security software can help reduce the chances of a computer being infected by a virus or other malware.
    • Key logging software is used to record a user's keystrokes.
      By: Marc Dietrich
      Key logging software is used to record a user's keystrokes.
    • Physical theft is a type of computer security risk.
      By: Syda Productions
      Physical theft is a type of computer security risk.