Professional Documents
Culture Documents
OCR and
Security
Computer Science
J276 Unit 3
System Security
1
Objectives
• Understand threats to a computer system and what
they are targeting.
Silent Starter
Name the vulnerability!
Activity
Phishing
Social Engineering
Network Policy
Each of you on your pod will be
responsible for one threat. Extension: Fill the second
table about other non-
You need to research; listed threats
Help box:
• What the threat is http://www.teach-ict.com
/2016/GCSE_Computing/
OCR_J276/1_6_network_s
• What it effects ecurity/network_threats/
miniweb/index.php
• How to protect against it
The CPU
Unit 1 Systems architecture, memory and storage
Student Teacher
• You now need to teach the rest of your group about
the threat you were given
• The rest of the group MUST complete the table at
the same time Malware
Phishing
Social Engineering
Network Policy
The CPU
Unit 1 Systems architecture, memory and storage
Malware
Malware is the correct name for ALL forms of Virus.
The aim of the virus is to infect your computer and
start to replicate itself across your hard drive to make it
difficult to remove.
Viruses are usually spread through attachments in
email, downloads from suspicious websites or by
connecting to a infected computer with a memory
stick.
Anti Virus software will protect against most Malware.
The CPU
Unit 1 Systems architecture, memory and storage
Phishing
Phishing is a type of fraud that happens online.
Emails will be sent where the sender is trying to make
the read feel sorry for them, or think that they are a
respectful business man.
They will ask for bank details, or personal information
in order to take money or steal their identity.
You should never click a link from a suspicious email,
and always check the email address to see if it is
believable.
The CPU
Unit 1 Systems architecture, memory and storage
Human Error
On average, people have more than 25 accounts where
they need to log in with a password.
http://www.bbc.co.uk/news/technology-37431335
Brute Force Attacks
Brute force attacks are a form of hacking where the
user tries to guess a password by entering in different
combinations of letters, words and symbols.
A program will make use of a collection of the most
commonly used passwords and attempt to log in using
that.
Password Checker
Brute Force
The CPU
Unit 1 Systems architecture, memory and storage
SQL Injection
SQL Injection is a method of taking advantage of poor
security or poorly written code in websites.
When you log into a computer you have to enter a User name and
password.
A computer will then return True or False (1 or 0) if the
user name or password has been accepted.
Plenary - Answers
Malware Any hostile or intrusive software - including computer virus’ and
spyware. Prevent with Anti-virus software
A type of fraud that happens online. Prevent by not clicking and
Phishing
following the links.
Attacks that target people rather than hardware or software, such as
Social Engineering bribing a user to break their company's network policy and provide
personal data.
A form of hacking where the user tries to guess a password by
Brute Force Attack entering in different combinations of letters, words and symbols.
Prevent with a very strong password.