It includes:
- Student Learning Record Workbook (for use by students)
- Student Learning Record Answers (for use by teachers)
- End of Topic test and answers
- Lesson PowerPoint’s for every lesson
- Any associated answers or references sheets for class activities
This topic covers:
1.4.1 Threats to computer systems and networks
- Forms of attack:
- Malware
- Social engineering, e.g. phishing, people as the ‘weak point’
- Brute-force attacks
- Denial of service attacks
- Data interception and theft
- The concept of SQL injection
1.4.2 Identifying and preventing vulnerabilites
- Common prevention methods:
- Penetration testing
- Anti-malware software
- Firewalls
- User access levels
- Passwords
- Encryption
- Physical security