pptx, 99.4 KB
pptx, 99.4 KB

NEW J277 SPECIFICATION

Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Network Security
1.4.1 Threats to computer systems and networks ¨ Forms of attack:
o Malware
o Social engineering, e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection

1.4.2 Identifying and preventing vulnerabilities
¨ Common prevention methods:
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security

Reviews

Something went wrong, please try again later.

This resource hasn't been reviewed yet

To ensure quality for our reviews, only customers who have purchased this resource can review it

Report this resourceto let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.