Your SlideShare is downloading. ×
0
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Computer Viruses, Biometrics, And Encryption

452

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
452
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
34
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. COMPUTER VIRUSES, BIOMETRICS, AND ENCRYPTION Jennifer Patetta Computer Apps 3-10-08
  • 2. CODE RED VIRUS <ul><li>a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. </li></ul><ul><li>The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character 'N' to overflow a buffer. </li></ul>
  • 3. “ LOVE BUG” VIRUS <ul><li>A computer virus that was sent as an attachment to an email message with the text &quot;ILOVEYOU&quot; in the subject line. The virus arrived with the simple subject of &quot;ILOVEYOU&quot; and an attachment &quot;LOVE-LETTER-FOR-YOU.TXT.vbs&quot;. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. </li></ul><ul><li>It cost a lot to get rid of it. </li></ul>
  • 4. BIOMETRIC COMPUTER SECURITY <ul><li>Biometrics are methods for uniquely recognizing humans based on the physical or behavior trails. In information technology, biometrics is a form of identity access management and access control. </li></ul><ul><li>Examples: </li></ul><ul><ul><li>Voice Recognition </li></ul></ul><ul><ul><li>Fingerprints </li></ul></ul><ul><ul><li>The Iris </li></ul></ul>
  • 5. PHISHING SCHEMES <ul><li>in late 2006 a computer worm took over pages on MySpace and altered links to direct surfers to websites designed to steal login details. Experiments show a success rate of over 70% for phishing attacks on social networks </li></ul><ul><li>Social networking sites are now a prime target of phishing, since the personal details in such sites can be used in identity theft </li></ul>
  • 6. ADVANTAGES OF BIOMETRIC SECURITY <ul><li>Replace hard-to-remember passwords which may be shared or observed. </li></ul><ul><li>Reduce fraud by employing hard-to-forge technologies and materials. </li></ul><ul><li>Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. </li></ul>
  • 7. DISADVANTAGES OF BIOMETRIC SECURITY <ul><li>It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time. </li></ul><ul><li>For people affected with diabetes, the eyes get affected resulting in differences.  </li></ul><ul><li>Biometrics is an expensive security solution. </li></ul>
  • 8. HOW ANTI VIRUS COMBAT VIRUSES <ul><li>Signature based detection </li></ul><ul><ul><li>To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces. </li></ul></ul>
  • 9. INFORMATION THAT SHOULD BE ENCRYPTED <ul><li>Credit Card Information </li></ul><ul><li>You’re address and other personal information </li></ul><ul><li>Social Security Numbers </li></ul>

×