This comparison covers Common Network Threats within Technical Attacks for GCSE Computer Science. Revise Technical Attacks in Network Security for GCSE Computer Science with 15 exam-style questions and 16 flashcards. This topic appears less often, but it can still be a useful differentiator on mixed-topic papers. It is section 3 of 8 in this topic. Use this comparison to connect the idea to the wider topic before moving on to questions and flashcards.
Topic position
Section 3 of 8
Practice
15 questions
Recall
16 flashcards
Common Network Threats
| Threat | Description | Impact |
|---|---|---|
| Brute Force | Trying every possible password combination systematically | Account access, data theft |
| DDoS | Flooding server with traffic from multiple sources | Service unavailable, business disruption |
| SQL Injection | Inserting malicious code into database queries | Data theft, database corruption, authentication bypass |
| Man-in-the-Middle | Intercepting communication between two parties | Data theft, altered communications, eavesdropping |
| Data Interception | Capturing data as it travels across network | Privacy breach, credential theft |
| Insider Threats | Malicious actions by authorised users | Data theft, sabotage, privilege abuse |