Network SecurityComparison

Common Network Threats

Part of Technical AttacksGCSE Computer Science

This comparison covers Common Network Threats within Technical Attacks for GCSE Computer Science. Revise Technical Attacks in Network Security for GCSE Computer Science with 15 exam-style questions and 16 flashcards. This topic appears less often, but it can still be a useful differentiator on mixed-topic papers. It is section 3 of 8 in this topic. Use this comparison to connect the idea to the wider topic before moving on to questions and flashcards.

Topic position

Section 3 of 8

Practice

15 questions

Recall

16 flashcards

Common Network Threats

Threat Description Impact
Brute Force Trying every possible password combination systematically Account access, data theft
DDoS Flooding server with traffic from multiple sources Service unavailable, business disruption
SQL Injection Inserting malicious code into database queries Data theft, database corruption, authentication bypass
Man-in-the-Middle Intercepting communication between two parties Data theft, altered communications, eavesdropping
Data Interception Capturing data as it travels across network Privacy breach, credential theft
Insider Threats Malicious actions by authorised users Data theft, sabotage, privilege abuse

Keep building this topic

Read this section alongside the surrounding pages in Technical Attacks. That gives you the full topic sequence instead of a single isolated revision point.

Practice Questions for Technical Attacks

Which of the following best describes a brute force attack?

  • A. Sending millions of requests to crash a server
  • B. Trying every possible combination of characters until the correct password is found
  • C. Inserting malicious code into a database query
  • D. Intercepting data as it travels across a network
1 markfoundation

Explain what a DDoS attack is and how it affects a network.

3 marksstandard

Quick Recall Flashcards

Want to test your knowledge?

PrepWise has 15 exam-style questions and 16 flashcards for Technical Attacks — with adaptive difficulty and instant feedback.

Join Alpha