Professional Documents
Culture Documents
OCR and
Security
Computer Science
J276 Unit 3
System Security
1
Objectives
• Understand threats to a computer system and what
they are targeting.
Silent Starter
Name the vulnerability!
Activity
Time – 30mins
You have a worksheet in front of you, with the main
threats written on it.
Malware
Malware is the correct name for ALL forms of Virus.
The aim of the virus is to infect your computer and
start to replicate itself across your hard drive to make it
difficult to remove.
Viruses are usually spread through attachments in
email, downloads from suspicious websites or by
connecting to a infected computer with a memory
stick.
Anti Virus software will protect against most Malware.
The CPU
Unit 1 Systems architecture, memory and storage
Phishing
Phishing is a type of fraud that happens online.
Emails will be sent where the sender is trying to make
the read feel sorry for them, or think that they are a
respectful business man.
They will ask for bank details, or personal information
in order to take money or steal their identity.
You should never click a link from a suspicious email,
and always check the email address to see if it is
believable.
The CPU
Unit 1 Systems architecture, memory and storage
Human Error
On average, people have more than 25 accounts where
they need to log in with a password.
Password Checker
Brute Force
The CPU
Unit 1 Systems architecture, memory and storage
SQL Injection
SQL Injection is a method of taking advantage of poor
security or poorly written code in websites.
When you log into a computer you have to enter a User name and
password.
A computer will then return True or False (1 or 0) if the
user name or password has been accepted.