1.4.1 Threats to computer systems and networks

Forms of attack

Malware

Social engineering

Phising

People as the 'weak point'

Brute-force attacks

Denial of service attacks

Data interception and theft

The concept of SQL injection