answersLogoWhite

0


Best Answer

Risks can be grouped in many ways, but here is how I group them.

Top level groupings

1. Risks that confidentiality will not be sustained

2. Risks that data integrity may not be sustained

3. Risks that the system may not be available

For confidentiality, the risks are usually one of three types:

  • unauthorized outsiders trying to gain access to information on the system
  • insiders with legitimate access to the system who try to get access to information on it that they are not authorized to have access to
  • inadvertent disclosure of information by mistakes made by authorized individuals - such as posting internal company information on the public website instead of the protected internal server or sending an email to the wrong person

For integrity, the risks are usually

  • malicious outsider breaking into the system to destroy or alter files
  • malicious insider abusing their access to destroy or alter files
  • accidental corruption of data through insider mistakes
  • physical damage to storage media leading to data corruption
  • corruption of data in transit

For availability, the risks are usually

  • denial of service attacks by malicious outsiders
  • denial of service attacks by malicious insiders
  • denial of service because of hardware failures
  • denial of service because of software failures
  • natural disasters like floods, fire, lightning, etc.
User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

Getting your account deleted, losing your files or gettiing virus.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the types of computer security risk?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is a computer virus considered a security risk?

Yes, most of the computer virus have security threat to the infected computer. If your computer has been infected with virus, you should remove it quickly.


User habits that creates computer security risk?

anyone can answer this? thanks!


What has the author John McCumber written?

John McCumber has written: 'Assessing and managing security risk in IT systems' -- subject(s): Computer security, Data protection, Risk assessment, OverDrive, Computer Technology, Nonfiction


What has the author Thomas R Peltier written?

Thomas R. Peltier has written: 'Policies & procedures for data security' -- subject(s): Electronic data processing departments, Security measures, Computer security 'Complete Guide to CISM Certification' 'Information security fundamentals' -- subject(s): Computer security, Data protection, Computer Technology, Nonfiction, OverDrive 'Information security risk analysis' -- subject(s): Computer networks, Security measures, Computer security, Risk assessment 'Information Security Fundamentals On-line Self-study Course'


Is the computer security vulnerability at risk?

"Yes, all computer security are vulnerable to risks like the Trojan and other computer viruses or spams. If you want to protect your computer, you need to buy antivirus soft-wares."


What has the author J A T Pritchard written?

J. A. T. Pritchard has written: 'Computer security' -- subject(s): Computer security, Electronic data processing departments, Security measures 'Introduction to On-line system' 'Security in communications systems' -- subject(s): Computer networks, Data transmission systems, Security measures 'Risk management in action' -- subject(s): Auditing, Electronic data processing departments, Risk management, Security measures


Where can one buy a web connected security camera?

Web connected security cameras can be gotten from two types of stores/retailers. It can be purchased from a security style company in addition to other types of security or it can be purchased from a computer hardware supplier who sells these types of cameras.


How many types of Computer virus?

20 Common Types of Viruses Affecting Your Computer. When we talk about computer security, the virus is the leading threat. It can destroy a single program or the whole computer system instead


Are there any types of computer cases or bags that are NOT acceptable for airport security?

No, all computer cases and bags are acceptable for airport security. What matters is what is being carried inside the bag or case.


Do you have to buy computer security?

Computer Security is a necessary part of owning a computer. If you are surfing the internet, unfortunately, there will be some malicious content on there. Without some degree of Internet and/or Computer Security, your computer is at risk of infection, and the potential of Identity Theft is quite high. Personally, I would recommend McAfee or Kaspersky - both very good Computer Security suites. If you combine Zone Alarm with AVG (Or Avast), you get free protection from hackers and viruses.


Does cloud computing present a security risk for Canadian businesses?

Any use of computer services involves a risk. But then, computer use of any kind involves risk. There will always be problems with security and privacy at desktop systems. A few areas in Canada have made it an offense for provider such as Cloud to disclose any information gathered through use of their service.


Dsi want to get on WiFi but your routers security settings dont support the dsdoes changing the security settings risk people haking your computer?

The DSi can use any Security settings a WII can use