OCR: Topic 19 Resources

Students need to understand:
  • forms of attack
  • threats posed to networks:
    • malware
    • phishing
    • people as the ‘weak point’ in secure systems (social engineering)
    • brute force attacks
    • denial of service attacks
    • data interception and theft
    • the concept of SQL injection
    • poor network policy


Choose from the following to help you learn:

Books

CAMBRIDGE Computer Science: 
Page 205 Section "System security" which continues right through to "zero-day attack" on Page 211
ROBSON & HEATHCOTE Computer Science (9-1):
Page 37. Section "Network threats" which continues right through to "SQL injection" on Page 41.
SUSAN ROBSON GCSE Computing(3rd edition):
n/a
SUSAN ROBSON GCSE Computing(2012):
n/a
AXSIED GCSE Computer Science (3rd edition)
Page 37 - R19. Section "Computer Security - Methods of attack" whole page
Page 39 - R20. Section "Computer Security - Methods of attack 2" whole page
Page 41 - R21. Section "Computer Security - Malware" whole page
Page 43 - R22. Section "Backdoors" to "spyware" top half of page

ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 57. Section "Networks - security", threats appear on Page 57, Page 61 "Malware", Pages 63-65 "Common hacking strategies". We look at prevention in Topic 20.

Web Sites

BBC Bitesize: Page 1 Network Security and Page 3 Security Failures (Not enough detail on specific threats)
Cambridge MOOC:  (Nothing specifically on threats posed to networks)
Wikipedia: Cyber-attack, Types of Attacks, Social engineering, Malware, Phishing, DDoS , SQL Injection and Brute-force attack (8 articles)
Simple Wikipedia: Hacker, Malware, Social Engineering, Brute-force attackDenial of Service and Phishing (6 articles)
Techopedia: Malware, Phishing, Brute Force Attack, Denial of Service and SQL injection attack (5 articles)
Teach-ICT:  Network Security Threats

YouTube

RadwanoVetch: (30 mins long but covers most forms of attack) https://youtu.be/BE4ytPyDW_Y

Phishing:
https://youtu.be/QcWwdhSuAYE

More on Phishing:
https://youtu.be/W2tZEFUCjTs

Malware: Watch from 0:33

Who makes malware?

DDoS:
https://youtu.be/OhA9PAfkJ10

SQL injection: https://youtu.be/FwIUkAwKzG8

Brute Force Attack: https://youtu.be/OE2x8f9U66Q



Last modified: Sunday, 8 October 2017, 11:15 AM