1.4.2 - Identifying and Preventing Vulnerabilities
June 7, 2023
In the previous section, 1.4.1 - Threats to Computer Systems and Networks, we looked at a fairly comprehensive rundown of the most common and prevalent attacks that exist to compromise system security, steal data and gain access to computers. This section focuses more on preventative measures - how can we ensure that computer systems are […]
1.4.1 - Threats to Computer Systems and Networks
June 6, 2023
As the number of network connected devices increases, so does the proportion of poorly designed and insecure devices. Many people do not understand the significance of poor security, whether that is in devices they own or their own personal security such as selecting weak passwords that are easy to guess or compromise. Any device which […]

