What was the Code Red Virus?
The Code Red worm was a computer worm
observed on the Internet on July 13, 2001. It
attacked computers running Microsoft’s II web
What was the “Love Bug” Virus? What
damage did it do
A new computer virus spread around the world
recently with a vengeance. This virus traveled via e-
mail messages entitled quot;I Love You,quot; crippling
government and business computers in Asia, Europe,
and the United States. No immediate cure was
known as experts were stunned by the speed and
wide reach of the virus.
What is Biometric Computer Security?
biometric computer security system requires the user to
provide a fingerprint (or other biometric) to the system, which
is then verified against a stored biometric template. Because
fingerprints offer an additional factor of authentication, i.e.,
something you are, in addition to something that you know
(password), or have (token), biometric security systems offer
significant improvements over traditional computer security.
Give an example of Phishing Scheme?
Always remember, companies like Google, eBay or
Amazon will never send you an email asking for
account details and most companies will never send
you an insecure (http://) link instead of a secure
Here’s a copy of an email I received today…
Dear Google AdWords customer!
In order to confirm your contact details, please click the link below:
This should take you directly to the Google AdWords Form.
Thank you for choosing AdWords. We look forward to providing you
with the most
effective advertising available.
The Google AdWords Team
When hovering over the link in the email, the real url is …
What are 3 advantages of Biometric
Three Advantages Include:
A. Will give you 100% accuracy and cant be hacked
B. Many different types including physical, and
C. Tougher to steal the information
2 disadvantages of Biometric Security
Invasion of privacy
How does Anti Virus Software combat
computer software used to
Antivirus software (or anti-virus) is
identify and remove computer viruses, as well as many other
types of harmful computer software, collectively referred to as
malware. While the first antivirus software was designed
exclusively to combat computer viruses, most modern antivirus
software can protect against a wide range of malware, including
worms, rootkits, and Trojans.
What type of information should be
encrypted? 3 Examples
encryption is the process of transforming
information (referred to as plaintext) using
an algorithm (called cipher) to make it
unreadable to anyone except those
possessing special knowledge, usually
referred to as a key. The result of the
process is encrypted information (in
cryptography, referred to as ciphertext). In
many contexts, the word encryption also
implicitly refers to the reverse process,
decryption (e.g. “software for encryption”
can typically also perform decryption), to
make the encrypted information readable
again (i.e. to make it unencrypted).
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.