• Understand that different types of computer and/or system are exposed to different
threats and that they contain different vulnerabilities. Possible vulnerabilities include:
o network, including firewall ports and external storage devices
o organisational, including file permissions or privileges, password policy
o software, including from an untrustworthy source, downloaded software,
illegal copies, SQL injection and new zero-day exploits
o operating system, including unsupported versions, updates not installed
o mobile devices reliant on Original Equipment Manufacturers (OEMs) to
update system software
o physical, including theft of equipment, Universal Serial Bus (USB) storage
devices with sensitive data, collection of passwords and other information by
social-engineering methods
o process of how people use the system, including leaks and sharing security details
o security implications of cloud computing and of the Internet of Things (IoT) devices.
• Understand where to find up-to-date sources of information on specific known hardware
and software vulnerabilities.
• Attack vectors, including: Wi-Fi, Bluetooth®, internet connection, internal network access.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
test |
er
re
More Than Just a Minute - Learners assess themselves against key learning points indicating a level of understanding to inform teacher planning.