0
Code Red Virus <ul><li>A computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft'...
Love Bug Virus <ul><li>The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of &quot;ILOVEYOU&quot; a...
Biometric Computer Security <ul><li>Is a new type of security using finger print, iris scanning and many other ways to hel...
Phishing Scheme <ul><li>phishing is the criminally fraudulent process of attempting to acquire sensitive information such ...
<ul><li>3 advantages </li></ul><ul><ul><li>It is possibly the most reliable security system </li></ul></ul><ul><ul><li>Onl...
<ul><li>3 disadvantages </li></ul><ul><ul><li>Only one person has the ability to log on </li></ul></ul><ul><ul><li>If some...
<ul><li>Ways it attacks viruses: </li></ul><ul><ul><li>Detects viruses through signatures or malicious activity </li></ul>...
<ul><li>3 types of information that should be encrypted </li></ul><ul><ul><li>Secrets </li></ul></ul><ul><ul><li>Passwords...
Upcoming SlideShare
Loading in...5
×

Code Red Virus

244

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
244
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Code Red Virus"

  1. 1. Code Red Virus <ul><li>A computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. </li></ul>
  2. 2. Love Bug Virus <ul><li>The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of &quot;ILOVEYOU&quot; and an attachment &quot;LOVE-LETTER-FOR-YOU.TXT.vbs&quot;. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system </li></ul>
  3. 3. Biometric Computer Security <ul><li>Is a new type of security using finger print, iris scanning and many other ways to help step up security </li></ul>
  4. 4. Phishing Scheme <ul><li>phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication </li></ul>
  5. 5. <ul><li>3 advantages </li></ul><ul><ul><li>It is possibly the most reliable security system </li></ul></ul><ul><ul><li>Only one person can access it </li></ul></ul><ul><ul><li>It isn’t possible for someone to find out your password </li></ul></ul>Biometric Security
  6. 6. <ul><li>3 disadvantages </li></ul><ul><ul><li>Only one person has the ability to log on </li></ul></ul><ul><ul><li>If something happens where you can not perform the biometric security process, you will not be able to access the computer </li></ul></ul><ul><ul><li>It costs a good deal of money to get biometric security </li></ul></ul>Biometric Security cont.
  7. 7. <ul><li>Ways it attacks viruses: </li></ul><ul><ul><li>Detects viruses through signatures or malicious activity </li></ul></ul><ul><ul><li>There are often anti-virus programs that are just for some specific viruses </li></ul></ul>Anti-Virus software
  8. 8. <ul><li>3 types of information that should be encrypted </li></ul><ul><ul><li>Secrets </li></ul></ul><ul><ul><li>Passwords </li></ul></ul><ul><ul><li>Military plans/messages </li></ul></ul>Encryption
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×