Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context. Feel free to have a browse of the resources available, which include: -Individual Lessons -Full Schemes of work -Mock Exam Papers & Mark Schemes -Revision Plans All resources are available at a very reasonable price and have be used effectively to teach lessons. Enjoy!

pptx, 99.4 KB
pptx, 99.4 KB

NEW J277 SPECIFICATION

Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Network Security
1.4.1 Threats to computer systems and networks ¨ Forms of attack:
o Malware
o Social engineering, e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection

1.4.2 Identifying and preventing vulnerabilities
¨ Common prevention methods:
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security

Reviews

Something went wrong, please try again later.

This resource hasn't been reviewed yet

To ensure quality for our reviews, only customers who have purchased this resource can review it

Report this resourceto let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.