When describing threats that make you information systems network vulnerable, one thing to keep in mind is that they continue to evolve. So while research can be done on the malicious threats that are out now, two weeks from now there could be different ones that would be required to get to know if one wants to keep up with the threats that are out there.
The most widely known threat is a computer virus, a program used to alter the way a computer works unbeknownst to the user. A virus works without permission to alter, change or harm the way a computer, smart phone or tablet works. Normally they replicate and execute themselves. Typically one would get a virus from sharing files, music or videos, visiting an affected website, or opening spam email amongst other ways. Some viruses are used to damage programs or delete files, others are made to replicate themselves making it virtually impossible to do anything on the internet. Making sure that you have anti-virus software, firewalls, updating your system, and paying close attention to what your emails and what you are downloading will help to make sure that you keep yourself safe from getting a virus.
Another type of threat is phishing, where people act like a trustworthy business or person and are actually stealing personal data and sensitive financial information through fraudulent emails, instant messages or fake websites. Once they have received this information they can then use it to set up accounts in your name and ruin your credit, steal your money or your identity. This type of threat is extremely widespread because most people can’t tell that the email or website they are clicking on are fake.
If you pay close attention to what you are clicking on, and see what looks like a legitimate company asking for personal information don’t give them that information, unless there is a “lock” button on the site or it is an https address in the address bar. If you don’t know what you are looking for, or are worried it might still be a threat,