Tooltip
These resources have been reviewed and selected by STEM Learning’s team of education specialists for factual accuracy and relevance to teaching STEM subjects in UK schools.

System Security

The first video introduces the variety of threats to system security.  Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained.  Simple notes on each of these are presented toward the end of the video.

The second video explores each of these threats again, considering the impact on both computers and users.  “People as a weak point”, or social engineering is considered, together with the need for strong network policies.

The third video in this series considers each of the main threats to systems security again.  This time considering how the threats can be identified and prevented.  It is strongly advised you watch the videos, “forms of attack” and “threats to networks” before watching this video.

Resources:

https://student.craigndave.org/videos/ocr-gcse-slr1-6-forms-of-attack

https://student.craigndave.org/videos/ocr-gcse-slr1-6-threats-posed-to-networks

https://student.craigndave.org/videos/ocr-gcse-slr1-6-identifying-and-preventing-vulnerabilities

Show health and safety information

Please be aware that resources have been published on the website in the form that they were originally supplied. This means that procedures reflect general practice and standards applicable at the time resources were produced and cannot be assumed to be acceptable today. Website users are fully responsible for ensuring that any activity, including practical work, which they carry out is in accordance with current regulations related to health and safety and that an appropriate risk assessment has been carried out.

Information on the permitted use of this resource is covered by the Category Three Content section in STEM Learning’s Terms and conditions.