week 2

A2 System vulnerabilities

• Understand that different types of computer and/or system are exposed to different

threats and that they contain different vulnerabilities. Possible vulnerabilities include:

o network, including firewall ports and external storage devices

o organisational, including file permissions or privileges, password policy

o software, including from an untrustworthy source, downloaded software,

illegal copies, SQL injection and new zero-day exploits

o operating system, including unsupported versions, updates not installed

o mobile devices reliant on Original Equipment Manufacturers (OEMs) to

update system software

o physical, including theft of equipment, Universal Serial Bus (USB) storage

devices with sensitive data, collection of passwords and other information by

social-engineering methods

o process of how people use the system, including leaks and sharing security details

o security implications of cloud computing and of the Internet of Things (IoT) devices.

• Understand where to find up-to-date sources of information on specific known hardware

and software vulnerabilities.

• Attack vectors, including: Wi-Fi, Bluetooth®, internet connection, internal network access.


Last Updated
2018-08-29 14:13:19

English and Maths

English

er


Maths

re


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage

More Than Just a Minute - Learners assess themselves against key learning points indicating a level of understanding to inform teacher planning.



Traffic Lights - Learners use green, amber and red traffic lights to indicate levels of understanding and to attract support from peers and the teacher.

Links to Learning Outcomes

Links to Assessment criteria

test

 


Files that support this week


| | | | |
Week 1
Prev
Week 2
Prev
Week 3
Prev

Next