1.4.1 Threats to computer systems and networks
Forms of attack
Forms of attack
Malware
Malware
Social engineering
Social engineering
Phising
Phising
People as the 'weak point'
People as the 'weak point'
Brute-force attacks
Brute-force attacks
Denial of service attacks
Denial of service attacks
Data interception and theft
Data interception and theft
The concept of SQL injection
The concept of SQL injection