answersLogoWhite

0


Best Answer

Lightening, Storms, Earthquakes, Hurricanes, tornadoes

User Avatar

Fatima Ziemann

Lvl 10
3y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

Environmental (natural) threats include

- Flood

- Fire

- Earthquakes, storms and tornadoes

- Excessive Heat

- Inadequate Power Supply

(People are still the biggest threat, but aren't environmental.)

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

"Environmental" threats are those which are present due to the environment where the computers are located. It is probably easier to group them with "natural" threats to discuss them. Some examples of environmental threats are:

Extreme heat

Extreme cold

High humidity

Extremely low humidity (think static electricity)

Earthquakes

Tornadoes, Hurricanes, and high winds in general

Flooding (which can be associated with hurricanes of course)

Lightning

Storms - with high winds, rain - causing flooding and water damage, etc.

Power surges - possibly from lightning, but can come from other causes

Inadequate power - brownouts, blackouts, etc.

Vibration

Fire

Water leaks

Volcanoes

Dust

Insects, rodents, and other animal pests - the origin of the term "bug" for a computer problem is supposed to be a moth that got into the circuitry of an early generation computer and shorted out some things - mice and rats chewing on cables can certainly mess up systems - so can birds building nests or snakes or lizards crawling into cabling.

Even pollution can be considered an environmental threat if it impairs the ability of users and system administrators to use and maintain the system.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the Threats to information system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What best describes informational awareness equals Awareness of potential threats to information systems?

One must be aware and understand the different types of information in a system to understand the threats to the system. An awareness of the threats to the system is based on the information within the system.


Which of the following statements best describes IA Awareness of potential threats to information systems Integrated capability to detect and react to threats in a timely manner?

Maintaining awareness of potential threats to information and information systems


What are threats to the nervous system?

threats are if you blink to many times it will make your nerves system go crazy and you will twitch often.


How porters five forces model help computer based information system to gain a competitive advantage over its rivals?

The five porters include the following ; intense rivalry of the existing firm, threats of substitutes, threats of the buyers, threat of the suppliers, threats of the new entrant


What are some threats to the nervous system?

threats are if you blink to many times it will make your nerves system go crazy and you will twitch often.


What is a System Threat Assessment Report?

A System Threat Assessment Report is a document that identifies potential threats and vulnerabilities in a system or network. It assesses the likelihood of these threats occurring and their potential impact on the system's security. The report typically includes recommendations for mitigating or addressing these threats to improve the overall security posture of the system.


How do you maintain information system?

Maintaining an information system involves regular monitoring, updating software and hardware, backing up data, securing the system against cyber threats, and documenting system changes. It is important to establish maintenance schedules, perform regular health checks, and train staff to handle system maintenance effectively. Regularly reviewing and optimizing system performance is also key to maintaining an efficient information system.


What is the difference between program threats and system threats?

Program threats:Operating system's processes and kernel do the designated task as instructed. If a user programmade these process do malicious tasks then it is known as Program Threats. One of thecommon examples of program threat is a program installed in a computer which can store andsend user credentials via network to some hackerexample : VirusSystem threats:System threats refer to misuse of system services and network connections to put user introuble. System threats can be used to launch program threats on a complete network called asprogram attack. System threats create such an environment that operating system resources/user files are mis-used.example : worms


What is the attempted or successful unauthorized access use disclosure modification or destruction of information or interference with system operations in an information system called?

That is known as a cyber attack. It involves unauthorized access to information systems with the intent of disrupting, stealing, or manipulating data or system operations. Cyber attacks pose significant threats to the confidentiality, integrity, and availability of information.


What system shelters humans from threats such as diseases and toxins?

The immune system


How do threats differ from attacks?

Threats are potentials for attacks. A threat is defined as a capability, intention, and/or attack method of an adversary to exploit, or any circumstance or event with the potential to cause harm to, information or an information system. It is also any circumstance or event with the potential to harm an information system (IS) through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.Threats can include the potential for an earthquake or a fire as well as the potential for an attack by an individual or organization.


Environmental threats to information systems include all?

Environmental threats to information systems include all forms of natural disasters. This can also happen as a result of human error.