Data Interception and Theft. (3 marks)
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
Explain the concept of phishing and describe how it can be used to compromise computer security.
Social Engineering – Phishing. (3 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
Describe how malware can pose a threat to computer systems. Include in your answer an example of a specific type of malware and the impact it can have on a device.
Malware. (2 marks) Read More »