Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

Covering: forms of attack (passive/ active, inside/ outside), malware (viruses,

worms, trojans, spyware and adware), social engineering (phishing), brute force
attacks, denial of service attacks and SQL injection.

Made primarily for OCR GCSE Computer Science (J277) Paper 1. If you are following
another course, be sure to use the playlists on my channel.

If this video was useful, please like it and subscribe, it really helps! Also, if
you use an ad blocker, whitelisting my channel is very much appreciated!

These videos will always be free but if you'd consider a donation I'd be extremely
grateful - https://www.paypal.me/computersciencetutor or
https://ko-fi.com/mrbrowncs.

Link to my TES shop where I upload my teacher resources (including the


PowerPoints): https://www.tes.com/teaching-resources/shop/computersciencetutor

For any questions or enquiries, please email me using the address given on my
channel page.

You might also like