Intro

Objectives

  • Describe the processes involved in, and the aim of carrying out, a range of cyber security threats including:
    • brute-force attack;
    • data interception;
    • distributed denial of service (DDoS) attack;
    • hacking;
    • malware (virus, worm, Trojan horse, spyware, adware, ransomware);
    • pharming;
    • phishing and social engineering.

Resources

Videos

Slides

Worksheet

Extension activity