Understand different forms of cyber attack (based on technical weaknesses and behaviour), including social engineering (phishing, shoulder surfing, pharming), unpatched software, USB devices, digital devices and eavesdropping
Standard detail
CS.CI.2c
Depth 3Parent ID: 0067F7D17AFA4657B683CCC69F929F93Standard set: Computer Science 9-1
Original statement
Quick facts
- Statement code
- CS.CI.2c
- List ID
- 3
- Standard ID
- 43824B7B8E294CEA9529D143F3727966
- Subject
- Computer Science
- Grades
- 09
- Ancestor IDs
- 0067F7D17AFA4657B683CCC69F929F9384455E7F9FEF4F35A4868BF661331EE7CEA592C8FB384F4C89CEA0425A43562F
- Source document
- iGCSE_CS(9-1)
- License
- CC BY 4.0 US