36. OCR GCSE (J277) 1.4 Threats to networks
About this video
OCR J277 Specification Reference - Section 1.4
In the previous video in this series (forms of attack), the various threats to system security were outlined and explained. In this video we explore each of these threats again, considering the impact on both computers and users. “People as a weak point”, or social engineering is considered, together with the need for strong network policies.
Don't forget, whenever the blue note icon appears in the corner of the screen, that is your cue to take notes about the content being shown on the current slide.
00:00 Threats posed to networks
00:17 Intro
00:22 Threats posed to networks
00:35 Malware
01:44 Phishing
02:18 Brute-force attack
02:31 Denial-of-service attack
03:09 Data interception and theft
03:44 SQL injection
04:05 People as a weak point
04:51 Outro
Last updated: 02.03.26