36. OCR GCSE (J277) 1.4 Threats to networks


About this video

In the previous video in this series (forms of attack), the various threats to system security were outlined and explained. In this video we explore each of these threats again, considering the impact on both computers and users. “People as a weak point”, or social engineering is considered, together with the need for strong network policies.

Last updated: 29.04.25