35. OCR GCSE (J277) 1.4 Forms of attack


About this video

OCR J277 Specification Reference - Section 1.4

This video introduces the variety of threats to system security. Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained. Simple notes on each of these are presented toward the end of the video.

Don't forget, whenever the blue note icon appears in the corner of the screen, that is your cue to take notes about the content being shown on the current slide.

00:00 Forms of attack
00:16 Intro
00:21 Different forms of attack
00:44 Malware
01:59 Phishing
02:49 Brute-force attack
03:11 Denial-of-service attack
03:51 Data interception and theft
04:25 SQL injection
04:47 Recap
05:02 Outro

Last updated: 02.03.26