<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2020-5-3-0-1</article-id><article-id pub-id-type="publisher-id">2130</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>MAIN TYPES OF COMPUTER THREATS</article-title><trans-title-group xml:lang="en"><trans-title>MAIN TYPES OF COMPUTER THREATS</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Gogol</surname><given-names>Andrey Sergeevich</given-names></name><name xml:lang="en"><surname>Gogol</surname><given-names>Andrey Sergeevich</given-names></name></name-alternatives><email>andrewgogol777@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2020</year></pub-date><volume>5</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2020/3/ИТ_1.pdf" /><abstract xml:lang="ru"><p>Computer &amp;ndash; a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often these are mathematical calculations, but these sequences can also include data entry and output operations. Today, people combine computers and get networks and systems from them with a huge number of such instructions. Nowadays, almost every person has a portable computer with which they travel, with which they exchange data with friends, colleagues or relatives. Users of these devices exchange data with each other over the Internet and beyond. They also create local networks to ensure internal electronic document management at the enterprise. Or transmit information via external storage devices. Given the level of Informatization and the scale of the information infrastructure, we can understand that there are many vulnerabilities. Using these vulnerabilities, any attacker can inject malicious software into our computer. The purpose of the&amp;nbsp;article is to analyze existing types of computer threats, analyze vulnerabilities, and make recommendations that will help avoid system failures.</p></abstract><trans-abstract xml:lang="en"><p>Computer &amp;ndash; a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often these are mathematical calculations, but these sequences can also include data entry and output operations. Today, people combine computers and get networks and systems from them with a huge number of such instructions. Nowadays, almost every person has a portable computer with which they travel, with which they exchange data with friends, colleagues or relatives. Users of these devices exchange data with each other over the Internet and beyond. They also create local networks to ensure internal electronic document management at the enterprise. Or transmit information via external storage devices. Given the level of Informatization and the scale of the information infrastructure, we can understand that there are many vulnerabilities. Using these vulnerabilities, any attacker can inject malicious software into our computer. The purpose of the&amp;nbsp;article is to analyze existing types of computer threats, analyze vulnerabilities, and make recommendations that will help avoid system failures.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>computer programs</kwd><kwd>computer threats</kwd><kwd>vulnerabilities</kwd><kwd>malicious software</kwd><kwd>information</kwd></kwd-group><kwd-group xml:lang="en"><kwd>computer programs</kwd><kwd>computer threats</kwd><kwd>vulnerabilities</kwd><kwd>malicious software</kwd><kwd>information</kwd></kwd-group></article-meta></front><back /></article>