1.4
Network Security
Threats and protection methods
Malware: Viruses, worms, trojans, ransomware, spyware
Social engineering: Phishing, shoulder surfing, blagging
Brute force attacks: Try all password combinations
Firewalls filter incoming/outgoing traffic
Encryption scrambles data so only intended recipient can read
Penetration testing identifies vulnerabilities
Exam Tips
- •Always define key terms before explaining concepts
- •Use specific examples where possible to demonstrate understanding
- •Check mark allocation - one point per mark is a good guide