What are Physical Threats?
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
#share & #supportus
-------------------> @geekcode π
Share as more as π
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
#share & #supportus
-------------------> @geekcode π
Share as more as π
What are Non-physical threats?
A non-physical threat is a potential cause of an incident that may result in;
Loss or corruption of system data
Disrupt business operations that rely on computer systems
Loss of sensitive information
Illegal monitoring of activities on computer systems
Cyber Security Breaches
Others
The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;
Virus
Trojans
Worms
Spyware
Key loggers
Adware
Distributed Denial of Service Attacks
Unauthorized access to computer systems resources such as data
Phishing
Other Computer Security Risks
To protect computer systems from the above-mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken to protect cyber security threats
To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the userβs computer.
Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.
Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid.
#share & #supportus
------------------> @geekcode π
Share as more as π
A non-physical threat is a potential cause of an incident that may result in;
Loss or corruption of system data
Disrupt business operations that rely on computer systems
Loss of sensitive information
Illegal monitoring of activities on computer systems
Cyber Security Breaches
Others
The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;
Virus
Trojans
Worms
Spyware
Key loggers
Adware
Distributed Denial of Service Attacks
Unauthorized access to computer systems resources such as data
Phishing
Other Computer Security Risks
To protect computer systems from the above-mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken to protect cyber security threats
To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the userβs computer.
Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.
Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid.
#share & #supportus
------------------> @geekcode π
Share as more as π
Cybersecurity steps businesses must urgently adopt TechRadar
https://www.techradar.com/news/cybersecurity-steps-businesses-must-urgently-adopt
#share & #supportus
----------------------> @geekcode π
Share as more as π
https://www.techradar.com/news/cybersecurity-steps-businesses-must-urgently-adopt
#share & #supportus
----------------------> @geekcode π
Share as more as π
#COURSE
How to Make a WordPress Website β Step by Step!!
A complete step by step wordpress tutorial! Learn how to use WordPress to develop and build a website from scratch.β¦
ππ»πΏπΌπΉπΉ ππ²πΏπ²:-
https://geekcode.com/website
#share & #supportus
-------------------> @geekcode π
Share as more as π
How to Make a WordPress Website β Step by Step!!
A complete step by step wordpress tutorial! Learn how to use WordPress to develop and build a website from scratch.β¦
ππ»πΏπΌπΉπΉ ππ²πΏπ²:-
https://geekcode.com/website
#share & #supportus
-------------------> @geekcode π
Share as more as π
Hey guys βΊοΈ
geekcode is here β₯οΈ
Geekcode will conduct online giveaways related to programming ebooks & books,
Online coding platform memberships.
If you wants to participate in this kind of giveaways so read rules from here π
https://t.me/joinchat/AAAAAFUsOkh6mIhB1giwDQ
#shareπus #supportus
@geekcode π
Share as more as π
geekcode is here β₯οΈ
Announcement-:Geekcode will conduct online giveaways related to programming ebooks & books,
Online coding platform memberships.
If you wants to participate in this kind of giveaways so read rules from here π
https://t.me/joinchat/AAAAAFUsOkh6mIhB1giwDQ
#shareπus #supportus
@geekcode π
Share as more as π
Python And Django Framework For Beginners Complete Course
Beginner to Expert Python.Start from the basics and go all the way to creating your own applications and games! (13 hours of course)
Go from Beginner to Advanced in Python Programming by learning all of the basics to Object Orientated Programming.
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
ENROLL HERE -:
https://geekcode/Python-Django
#share & #supportus
-----------------> @geekcode π
Share as more as π
Beginner to Expert Python.Start from the basics and go all the way to creating your own applications and games! (13 hours of course)
Go from Beginner to Advanced in Python Programming by learning all of the basics to Object Orientated Programming.
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
ENROLL HERE -:
https://geekcode/Python-Django
#share & #supportus
-----------------> @geekcode π
Share as more as π
β³οΈ How to Recover Data From Corrupted OS
βββββββββββββ
β We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.
πΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select βUSB Driveβ from the list and click on βProceedβ. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.
πΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.
πΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the βScanβ button.
πΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.
πΉStep 5: You can either choose to preview or click on the βRecoverβ button to save the file. Make sure to choose a different drive or different USB to save the file.
β Thatβs it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.
@geekcode π
βββββββββββββ
β We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.
πΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select βUSB Driveβ from the list and click on βProceedβ. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.
πΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.
πΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the βScanβ button.
πΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.
πΉStep 5: You can either choose to preview or click on the βRecoverβ button to save the file. Make sure to choose a different drive or different USB to save the file.
β Thatβs it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.
@geekcode π
Geekcode is very Sad with you Guys, you kept muting Geekcode, because of which you are not able to see Geekcode posts.
Please unmute us π
Geekcode will never send any dirty 18+ contents
And never support any illegal work π
I heartily say to all of you, support @geekcode
#share us for care us π
Thank you β₯οΈ
@geekcode
Please unmute us π
Geekcode will never send any dirty 18+ contents
And never support any illegal work π
I heartily say to all of you, support @geekcode
#share us for care us π
Thank you β₯οΈ
@geekcode
π€ Top 5 Free Machine Learning and Deep Learning eBooks Everyone should read:
https://www.kdnuggets.com/2020/11/top-5-free-machine-learning-deep-learning-ebooks.html
#share & #supportus
------------------> @geekcode π
Share as more as π
https://www.kdnuggets.com/2020/11/top-5-free-machine-learning-deep-learning-ebooks.html
#share & #supportus
------------------> @geekcode π
Share as more as π
Hey guys βΊοΈ
geekcode is here β₯οΈ
Announcement-:
Geekcode will conduct online giveaways related to programming ebooks & books,
Online coding platform memberships.
If you wants to participate in this kind of giveaways so read rules from here π
https://t.me/joinchat/AAAAAFUsOkh6mIhB1giwDQ
#shareπus #supportus
@geekcode π
Share as more as π
geekcode is here β₯οΈ
Announcement-:
Geekcode will conduct online giveaways related to programming ebooks & books,
Online coding platform memberships.
If you wants to participate in this kind of giveaways so read rules from here π
https://t.me/joinchat/AAAAAFUsOkh6mIhB1giwDQ
#shareπus #supportus
@geekcode π
Share as more as π
GOOD NEWS! Now, three activations are included in the purchase of each Burp Bounty Pro license! If you have already bought it, the activations have been added automatically.
More info at:
burpbounty.net
#share & #supportus
-------------------> @geekcodeπ
Share as more as π
More info at:
burpbounty.net
#share & #supportus
-------------------> @geekcodeπ
Share as more as π