Timeline:
00:00 Introduction
00:28 Contents
00:53 What you need to demonstrate at GCSE
01:04 Mitigation vs prevention
01:56 How malware enters a network
02:42 Physical vs logical protection
03:08 How to prevent malware
03:35 How data may be stolen
04:13 Logical protection against malware
06:07 Brute force attacks: mitigation
08:06 SQL injections
09:08 Phishing
10:00 DDOS
11:09 Data interception/man-in-the-middle
11:32 Conclusion