Overview
This section focuses on the threats to computer networks and the methods used to protect them, ensuring data confidentiality, integrity, and availability.
Subtopics (J277 1.4)
Explore the subtopics below for more details and specific resources:
1.4.1 Threats to computer systems and networks
(Malware, Social Engineering, Brute-force, DoS, Interception, SQL Injection)
1.4.2 Identifying and preventing vulnerabilities
(Pen Testing, Anti-malware, Firewalls, Access Levels, Passwords, Encryption, Physical)
Revision Notes
Resources
(Add links to specific resources for Network Security.)