Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context. Feel free to have a browse of the resources available, which include: -Individual Lessons -Full Schemes of work -Mock Exam Papers & Mark Schemes -Revision Plans All resources are available at a very reasonable price and have be used effectively to teach lessons. Enjoy!

pptx, 193.45 KB
pptx, 193.45 KB

Here you will find easy to follow revision sheets which will help your students to recap the topic:

1.6 Systems Security which includes:

  • forms of attack
  • threats posed to networks:
  • malware
  • phishing
  • people as the ‘weak point’ in secure systems (social engineering)
  • brute force attacks
  • denial of service attacks
  • data interception and theft
  • the concept of SQL injection
  • poor network policy
  • identifying and preventing vulnerabilities:
  • penetration testing
  • network forensics
  • network policies
  • anti-malware software
  • firewalls
  • user access levels
  • passwords
  • encryption.

The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.

Check out my shop to save on buying multiple sheets!!

Enjoy!

Get this resource as part of a bundle and save up to 65%

A bundle is a package of resources grouped together to teach a particular topic, or a series of lessons, in one place.

Reviews

Something went wrong, please try again later.

This resource hasn't been reviewed yet

To ensure quality for our reviews, only customers who have purchased this resource can review it

Report this resourceto let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.