Transcript of "(3 11 09)Viruses, Biometrics, Encryption"
Code Red worm was a
computer worm observed on
the Internet on July 13, 2001. It
attacked computers running
Microsoft’s IIS web server.
ILOVEYOU was a computer virus that hit
numerous computers in 2000, when it
was sent as an attachment to an email
message with the text quot;ILOVEYOUquot; in the
Upon opening the attachment, the virus
sent a copy of itself to everyone in the
user's address list, posing as the user. It
also made a number of malicious
changes to the user's system.
Biometric computer security
systems tie a unique physical
attribute of a user to the IT
resources and data that they are
allowed to access.
Ex: fingerprint, voice activation, or
Scheme is a
fake site used to
convince you to insert
your personal and
financial information so
they can steal it.
3 advantages of Biometric Security
include people cannot steal your
identity without you being present, it’s
harder to steal identities, and you will be
the only one able to access whatever
technology has biometric security.
3 Biometric Security disadvantages
include: your children won’t be able to
access the computer without you, if you
feel sick the voice security might not pick
you up, or if you break the security
device then you will never be able to
get the information off the computer.
Virus Software combat
Viruses by first detecting
them, then containing
them, then destroying
that should be
encrypted is personal,
financial, and any other
information that could help
someone steal your identity.
Ex: bank site, email, or
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.