week 2

A2 System vulnerabilities

• Understand that different types of computer and/or system are exposed to different

threats and that they contain different vulnerabilities. Possible vulnerabilities include:

o network, including firewall ports and external storage devices

o organisational, including file permissions or privileges, password policy

o software, including from an untrustworthy source, downloaded software,

illegal copies, SQL injection and new zero-day exploits

o operating system, including unsupported versions, updates not installed

o mobile devices reliant on Original Equipment Manufacturers (OEMs) to

update system software

o physical, including theft of equipment, Universal Serial Bus (USB) storage

devices with sensitive data, collection of passwords and other information by

social-engineering methods

o process of how people use the system, including leaks and sharing security details

o security implications of cloud computing and of the Internet of Things (IoT) devices.

• Understand where to find up-to-date sources of information on specific known hardware

and software vulnerabilities.

• Attack vectors, including: Wi-Fi, Bluetooth®, internet connection, internal network access.


Last Updated
2018-08-29 14:13:19

Links to Learning Outcomes

Links to Assessment criteria

test

 


English

er


Maths

re







How 2's Coverage

More Than Just a Minute - Learners assess themselves against key learning points indicating a level of understanding to inform teacher planning.



Traffic Lights - Learners use green, amber and red traffic lights to indicate levels of understanding and to attract support from peers and the teacher.

Files that support this week


| | | | |
Week 1
Prev
Week 2
Prev
Week 3
Prev

Next

Next
Webmaster Spelling Notifications