SQL Injections. (2 marks)
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Explain the concept of phishing and describe how it can be used to compromise computer security.
Social Engineering – Phishing. (3 marks) Read More »
Describe how malware can pose a threat to computer systems. Include in your answer an example of a specific type of malware and the impact it can have on a device.
Malware. (2 marks) Read More »