Describe the processes involved in, and the aim of carrying out a range of cyber security threats.
Standard detail
INT.5.31
Depth 1Parent ID: B99B26B10B4E4B7881B09712864C3718Standard set: Computer Science (0478)
Original statement
Quick facts
- Statement code
- INT.5.31
- List ID
- 5.31
- Standard ID
- 275A94FD66B94FA8ABB063A28D079A04
- Subject
- Computer Science
- Grades
- 09, 10, 11, 12
- Ancestor IDs
- B99B26B10B4E4B7881B09712864C3718
- Source document
- IGCSE Computer Science Syllabus (0478) / 0478 Scheme of Work
- License
- CC BY 4.0 US