Cyber security threats compromise the confidentiality, integrity, and availability of data within computer systems. Candidates must distinguish between technical vulnerabilities, such as unpatched software susceptible to SQL injection or malware, and human vulnerabilities exploited through social engineering techniques like phishing. The study encompasses the mechanisms of attack, including brute force, data interception, and Denial of Service (DoS), and requires a critical analysis of the resultant impacts on individuals and organizations.
Key skills and knowledge for this topic
Key points examiners look for in your answers
Expert advice for maximising your marks
Pitfalls to avoid in your exam answers
Comprehensive revision notes & examples
Essential terms to know
How questions on this topic are typically asked
Practice questions tailored to this topic