#Backdoor: it is unauthorized access to the computer via programs or debugging features by avoiding normal authentication.
#Denial-of-service attack: Though it does not necessarily access data on other computers, its main purpose is to slow down the processes, especially blocking the users from using internet.
#Direct-access attack: it is an unauthorized remote access using Key loggers/computer worms, and can download huge amount of sensitive data.
#Eavesdropping: using tools like network snifflers help hackers to retrieve password and other confidential paperwork.
#Spoofing: Gaining unauthorised access to a computer by sending message from an IP address that seems trusted.
#Tampering: unauthorized access to a computer to intentionally delete or modify data in it.
#Privilege escalation: exploiting a bug or a flaw in a program or operation to have unauthorized access to resources that are usually not made available to users.
#Phishing: acquiring sensitive personal information from users by asking them directly, often under the pretence of a reputed company via the web.
#Social Engineering and Trojans: Trojans are malwares that cannot replicate itself and can only access user’s computers via Internet. Trojans are usually in the guise of “good” harmless software and it is very hard to determine a particular Trojan’s underlying purpose from the exterior.
#Reducing vulnerabilities: Users can keep all software updated, secure browsers and use strong passwords.
#Security by design: this measure is usually taken by the developers by ensuring the utmost protection in the design of hardware and software through good programming practices, continuous checking and authentication safeguards
#Hardware protection mechanisms: prevents tampering and unauthorized access of data
#Secure Operating systems
#Secure coding : Developing software in such a way that it can protect the program from security risks
#Capabilities and access control lists
#Response to breaches
#What aspect of CS is applied to security by design and architecture?
#To what extent can a user control the possibility of getting breaches in the system?
#How can we make our own security architecture?
Useful links below:
Knowing more about the different types of psychological factors>
How veracode establishes computer security
How to make Computers Secure?