Your SlideShare is downloading. ×
0
Code Red worm was a
The
 computer worm observed on
 the Internet on July 13, 2001. It
 attacked computers running
 Micros...
ILOVEYOU was a computer virus that hit

  numerous computers in 2000, when it
  was sent as an attachment to an email
  m...
 Biometric  computer security
  systems tie a unique physical
  attribute of a user to the IT
  resources and data that t...
Scheme is a
Phishing
 fake site used to
 convince you to insert
 your personal and
 financial information so
 they can st...
3 advantages of Biometric Security

    include people cannot steal your
    identity without you being present, it’s
   ...
3 Biometric Security disadvantages

    include: your children won’t be able to
    access the computer without you, if y...
Virus Software combat
Anti
 Viruses by first detecting
 them, then containing
 them, then destroying
 them.
that should be
Information
 encrypted is personal,
 financial, and any other
 information that could help
 someone steal ...
Upcoming SlideShare
Loading in...5
×

(3 11 09)Viruses, Biometrics, Encryption

197

Published on

Jordan Chaires
P.4.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
197
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "(3 11 09)Viruses, Biometrics, Encryption"

  1. 1. Code Red worm was a The computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s IIS web server.
  2. 2. ILOVEYOU was a computer virus that hit  numerous computers in 2000, when it was sent as an attachment to an email message with the text quot;ILOVEYOUquot; in the subject line.  Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system.
  3. 3.  Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access.  Ex: fingerprint, voice activation, or eye identification
  4. 4. Scheme is a Phishing fake site used to convince you to insert your personal and financial information so they can steal it.
  5. 5. 3 advantages of Biometric Security  include people cannot steal your identity without you being present, it’s harder to steal identities, and you will be the only one able to access whatever technology has biometric security.
  6. 6. 3 Biometric Security disadvantages  include: your children won’t be able to access the computer without you, if you feel sick the voice security might not pick you up, or if you break the security device then you will never be able to get the information off the computer.
  7. 7. Virus Software combat Anti Viruses by first detecting them, then containing them, then destroying them.
  8. 8. that should be Information encrypted is personal, financial, and any other information that could help someone steal your identity. Ex: bank site, email, or chatting sites
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×