Students need to understand:
  • forms of attack
  • threats posed to networks:
    • malware
    • phishing
    • people as the ‘weak point’ in secure systems (social engineering)
    • brute force attacks
    • denial of service attacks
    • data interception and theft
    • the concept of SQL injection
    • poor network policy

Choose from the following to help you learn:


CAMBRIDGE Computer Science:  
Page 205 Section "System security" which continues right through to "zero-day attack" on Page 211
ROBSON & HEATHCOTE Computer Science (9-1):
Page 37. Section "Network threatswhich continues right through to "SQL injection" on Page 41.
SUSAN ROBSON GCSE Computing(3rd edition): 
SUSAN ROBSON GCSE Computing(2012): 
AXSIED GCSE Computer Science (3rd edition)
Page 37 - R19. Section "Computer Security - Methods of attack" whole page
Page 39 - R20. Section "Computer Security - Methods of attack 2" whole page
Page 41 - R21. Section "Computer Security - Malware" whole page
Page 43 - R22. Section "Backdoors" to "spyware" top half of page

ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 57. Section "Networks - security", threats appear on Page 57, Page 61 "Malware", Pages 63-65 "Common hacking strategies". We look at prevention in Topic 20.

Web Sites

BBC Bitesize: Page 1 Forms of attackPage 2 Threats to networks
Cambridge MOOC:  (Nothing specifically on threats posed to networks)
Wikipedia: Cyber-attackTypes of AttacksSocial engineeringMalwarePhishingDDoS , SQL Injection and Brute-force attack (8 articles)
Simple Wikipedia: Hacker, MalwareSocial EngineeringBrute-force attack,  Denial of Service and Phishing (6 articles)
Techopedia: MalwarePhishingBrute Force AttackDenial of Service and SQL injection attack (5 articles)
Teach-ICT:  Network Security Threats 


RadwanoVetch: (30 mins long but covers most forms of attack) 


More on Phishing: 

Malware: Watch from 0:33 

Who makes malware? 


SQL injection: 

Brute Force Attack:  

Last modified: Wednesday, 23 September 2020, 7:02 AM