OCR: Topic 19 Resources
Completion requirements
View
Students need to understand:
forms of attack
threats posed to networks:
malware
phishing
people as the ‘weak point’ in secure systems (social engineering)
brute force attacks
denial of service attacks
data interception and theft
the concept of SQL injection
poor network policy
Choose from the following to help you learn:
Books
CAMBRIDGE Computer Science:
Page 205 Section "System security" which continues right through to "zero-day attack" on Page 211
ROBSON & HEATHCOTE Computer Science (9-1):Page 37. Section "Network threats" which continues right through to "SQL injection" on Page 41.
n/a
n/a
Page 37 - R19. Section "Computer Security - Methods of attack" whole page
Page 39 - R20. Section "Computer Security - Methods of attack 2" whole page
Page 41 - R21. Section "Computer Security - Malware" whole page
Page 43 - R22. Section "Backdoors" to "spyware" top half of page
Page 39 - R20. Section "Computer Security - Methods of attack 2" whole page
Page 41 - R21. Section "Computer Security - Malware" whole page
Page 43 - R22. Section "Backdoors" to "spyware" top half of page
ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 57. Section "Networks - security", threats appear on Page 57, Page 61 "Malware", Pages 63-65 "Common hacking strategies". We look at prevention in Topic 20.
Web Sites
BBC Bitesize: Page 1 Forms of attack, Page 2 Threats to networks
Cambridge MOOC: (Nothing specifically on threats posed to networks)
Wikipedia: Cyber-attack, Types of Attacks, Social engineering, Malware, Phishing, DDoS , SQL Injection and Brute-force attack (8 articles)
Simple Wikipedia: Hacker, Malware, Social Engineering, Brute-force attack, Denial of Service and Phishing (6 articles)
Techopedia: Malware, Phishing, Brute Force Attack, Denial of Service and SQL injection attack (5 articles)
Teach-ICT: Network Security Threats
YouTube
RadwanoVetch: (30 mins long but covers most forms of attack)
Phishing:
More on Phishing:
Malware: Watch from 0:33
Who makes malware?
DDoS:
SQL injection:
Brute Force Attack:
Last modified: Wednesday, 23 September 2020, 7:02 AM