OCR GCSE SLR1.6 Threats posed to networks

In the previous video in this series (forms of attack), the various threats to system security were outlined and explained.  In this video we explore each of these threats again, considering the impact on both computers and users.  “People as a weak point”, or social engineering is considered, together with the need for strong network policies.