<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>IB Computer Science</provider_name><provider_url>https://learnlearn.uk/ibcs</provider_url><author_name>learnlearnadmin</author_name><author_url>https://learnlearn.uk/ibcs/author/learnlearnadmin/</author_url><title>Network Security Threats - IB Computer Science</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="fga86yvNft"&gt;&lt;a href="https://learnlearn.uk/ibcs/network-security-threats/"&gt;Network Security Threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://learnlearn.uk/ibcs/network-security-threats/embed/#?secret=fga86yvNft" width="600" height="338" title="&#x201C;Network Security Threats&#x201D; &#x2014; IB Computer Science" data-secret="fga86yvNft" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>Accidental Damage One of the most common issues with network security is the risk of accidental damage to the network hardware and software due to accidents on the part of the user. These threats include: Accidentally deleting/altering files on the network. This is probably the most common issue and is also one of the most&hellip;&nbsp;Read More &raquo;</description><thumbnail_url>https://learnlearn.uk/gcsecs/wp-content/uploads/sites/8/2018/01/phishing.jpg</thumbnail_url></oembed>
