Cyber security
Learners should study the following:
Learners should study the following:
forms of attack
threats posed to networks:
malware
phishing
*people as the ‘weak point’ in secure systems (social engineering)
brute force attacks
*denial of service attacks
*data interception and theft
*the concept of SQL injection
poor network policy
identifying and preventing vulnerabilities:
*penetration testing
network forensics
network policies
anti-malware software
firewalls
*user access levels
passwords
encryption
Videos:
Cyber warfare: STUXNET
Demonstration of password hacking - CLICK HERE
Links: