Internet and cybersecurity - EduqasIdentifying vulnerabilities

Networks operate on the principles of communication and sharing. Unfortunately, these principles mean that network traffic and data can be more easily accessed by people who have no authority to do so. Different vulnerabilities need to be identified and measures put in place to protect systems from them.

Part ofComputer ScienceUnderstanding Computer Science

Identifying vulnerabilities

It is important that managers ensure their networks are safe from . They will often test to see how successful a possible attack could be.

Penetration testing

The purpose of is to determine how resilient a network is against an attack. It involves authorised users - sometimes an external party or organisation - probing the network for potential weaknesses and attempting to exploit them. This is known as ‘ethical hacking’, as it is done with full permission from the organisation.