37. OCR GCSE (J277) 1.4 Preventing vulnerabilities
About this video
OCR J277 Specification Reference - Section 1.4
In the last video in this series we consider each of the main threats to systems security again. This time considering how the threats can be identified and prevented. It is strongly advised you watch the videos, “forms of attack” and “threats to networks” before watching this video.
Don't forget, whenever the blue note icon appears in the corner of the screen, that is your cue to take notes about the content being shown on the current slide.
00:00 Preventing vulnerabilities
00:15 Intro
00:20 Identifying and preventing vulnerabilities
00:37 Malware
01:54 Phishing
02:19 Brute-force attack
03:29 Denial-of-service attack
04:07 Data interception and theft
04:50 SQL injection
05:44 Seven common prevention methods
06:32 Outro
Last updated: 02.03.26