OCR J277/01 – 1.4 Network security

1.4 Network security - Overview / Checklist
1.4.1 Threats to computer systems and networks
Forms of attack:

    Malware
    Social engineering, e.g. phishing, people as the ‘weak point’
    Brute-force attacks
    Denial of service attacks
    Data interception and theft
    The concept of SQL injection
1.4.2 Identifying and preventing vulnerabilities
Common prevention methods:

    Penetration testing
    Anti-malware software
    Firewalls
    User access levels
    Passwords
    Encryption
    Physical security

Recommended Resources

1.4.1 Threats to computer systems and networks
1.4.2 Identifying and preventing vulnerabilities

Further Reading…

Did you like this challenge?

Click on a star to rate it!

Average rating 4.7 / 5. Vote count: 14

No votes so far! Be the first to rate this post.

As you found this challenge interesting...

Follow us on social media!