1.4.1

Forms of Attack

Test yourself

Forms of Attack

Attacks on networks come in different forms:

Illustrative background for Insider attackIllustrative background for Insider attack ?? "content

Insider attack

  • When someone in an organisation gives away access details or sensitive information.
Illustrative background for Passive attackIllustrative background for Passive attack ?? "content

Passive attack

  • When a hacker eavesdrops on a network by 'sniffing' the data packets.
Illustrative background for Social engineeringIllustrative background for Social engineering ?? "content

Social engineering

  • When a person is exploited into giving away critical information that gives access to the network or accounts.
Illustrative background for Active attackIllustrative background for Active attack ?? "content

Active attack

  • When someone uses malware or other technical methods to compromise a network's security.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

2.1Algorithms

2.2Programming Fundamentals

2.3Producing Robust Programs

2.4Boolean Logic

2.5Programming Languages & IDEs

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson