Computer Viruses, Biometrics, And Encryption


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer Viruses, Biometrics, And Encryption

  1. 1. COMPUTER VIRUSES, BIOMETRICS, AND ENCRYPTION Jennifer Patetta Computer Apps 3-10-08
  2. 2. CODE RED VIRUS <ul><li>a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. </li></ul><ul><li>The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character 'N' to overflow a buffer. </li></ul>
  3. 3. “ LOVE BUG” VIRUS <ul><li>A computer virus that was sent as an attachment to an email message with the text &quot;ILOVEYOU&quot; in the subject line. The virus arrived with the simple subject of &quot;ILOVEYOU&quot; and an attachment &quot;LOVE-LETTER-FOR-YOU.TXT.vbs&quot;. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. </li></ul><ul><li>It cost a lot to get rid of it. </li></ul>
  4. 4. BIOMETRIC COMPUTER SECURITY <ul><li>Biometrics are methods for uniquely recognizing humans based on the physical or behavior trails. In information technology, biometrics is a form of identity access management and access control. </li></ul><ul><li>Examples: </li></ul><ul><ul><li>Voice Recognition </li></ul></ul><ul><ul><li>Fingerprints </li></ul></ul><ul><ul><li>The Iris </li></ul></ul>
  5. 5. PHISHING SCHEMES <ul><li>in late 2006 a computer worm took over pages on MySpace and altered links to direct surfers to websites designed to steal login details. Experiments show a success rate of over 70% for phishing attacks on social networks </li></ul><ul><li>Social networking sites are now a prime target of phishing, since the personal details in such sites can be used in identity theft </li></ul>
  6. 6. ADVANTAGES OF BIOMETRIC SECURITY <ul><li>Replace hard-to-remember passwords which may be shared or observed. </li></ul><ul><li>Reduce fraud by employing hard-to-forge technologies and materials. </li></ul><ul><li>Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. </li></ul>
  7. 7. DISADVANTAGES OF BIOMETRIC SECURITY <ul><li>It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time. </li></ul><ul><li>For people affected with diabetes, the eyes get affected resulting in differences.  </li></ul><ul><li>Biometrics is an expensive security solution. </li></ul>
  8. 8. HOW ANTI VIRUS COMBAT VIRUSES <ul><li>Signature based detection </li></ul><ul><ul><li>To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces. </li></ul></ul>
  9. 9. INFORMATION THAT SHOULD BE ENCRYPTED <ul><li>Credit Card Information </li></ul><ul><li>You’re address and other personal information </li></ul><ul><li>Social Security Numbers </li></ul>