Table of content

Linux Security Threats

Compared to other operating systems Linux is secured and that's why it is used at the server end by many MNC's.

Types of Security Threats

The different types of security threats are:

Distributed denial-of-service(DDoS) attack

In this threat, a hacker puts a network of zombie computers(belonging to other people) to attack or harm a particular site or server. It leads to an increase in the traffic volume in the site or the server, making it slow or may even shut down the server.


When another person, gets illegal access to a computer.


It is software that infects our computer, such as viruses, worms, Trojon horses, spyware, and addware. It may intimidate with scareware in form of a pop-up message that informs that the computer has a security problem or other incorrect information.
It may reformat the hard drive of the computer, causing loss of data, modify and delete files, steal sensitive information, and also send emails on behalf. It can also take control of the computer and its software running.


It redirects to a malicious and improper website by pointing to a correct URL. Though the URL is entered correctly, it opens a fake website. It convinces that the website is correct by spoofing or looking almost the same as the actual site. We may give our personal, confidential information unknowingly to someone with malicious intent.


Fake emails, text messages, and websites built to look like they are from authentic companies. They are sent by criminals to steal personal and financial information. It tricks us to provide information to modify, validate, or confirm the account. It appears official and intimidating.
It gives the cybercriminals our credentials so that they can modify our accounts and steal the credit card numbers.


It is malware that prevents access to our computer or files and displays a message that requests payment for the restriction to be removed. The popular means of infection are phishing emails that have malicious attachments, and website pop-up advertisements.
Ransomware often causes lock screen ransomware that shows an image and blocks from accessing the computer. The encryption ransomware encrypts files in the hard drive and shared network devices, USB drives, external hard drives, and cloud storage drives.


It is one of the most popular techniques of sending information out and gathering it from unsuspecting people. It can annoy us with unwanted, junk mails. It builds a burden for interacting service providers and businesses to filter electronic messages.
It phishes for information by cheating us into following links or entering details with offers and promotions. It gives the launchpad for malware, fraud, and threats to privacy.


It is the software that gathers personal data about us without our knowledge. They come to us in the form of a free download and are installed by default with/without our consent. It is difficult to get rid of them and can infect our computer with viruses.
It sends username, password, surfing trend, list of applications we have developed, settings, and even operating system version to third parties. Modifies the behavior of the computer without our knowledge. Forces us to visit unnecessary websites or fills up with pop-up ads.


It is a method used in association with phishing to steal information. A website or an email address is created such that it has a legitimate source. The email address may contain our name, name of someone we know, making it hard to understand if it is real or not.
It can send spam via our email address or a slight variation of email addresses in the contact lists. It builds sites similar to an authentic site.

Trojan Horses

It is a malicious program that is hidden or embedded in legitimate software. It is an executable file that installs itself and executes by default once it is downloaded. It is capable of deleting files. It utilizes our computer to hack another computer.
It keeps an eye on us with the webcam. It logs our keystrokes and remembers the credentials and personal information,

Wi-Fi Eavesdropping

It is another technique used by cybercriminals to gather personal data. It is like virtual listening in on the information that is shared over an unsecured Wi-Fi network.


It is a malicious program that is sent in the form of an attachment or a download with the intention of harming our computer as well as the computers of all in the contact list. Simply navigating a website can begin a download of a virus by default.
It can send spam and gives criminals access to our computers and contact lists. It can also hijack our browser and disable the security settings. It shows unwanted ads.


It is a popular threat to computers and the internet as a whole. It can travel independently without attaching itself to files or programs. It resides within the computer memory, does not affect the hard drive, and propagates by sending itself to other computers within a network.
It can spread to all in the contact list. It causes a lot of damage by shutting down parts of the Internet, causing havoc on the network and huge financial loss.

About Author :

Myself Debomita Bhattacharjee, an IT employee with 6+ years of experience in Software industry. My area of interest is Automation testing and Front End Development.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions