Viruses, Biometrics, Encryption
Upcoming SlideShare
Loading in...5
×
 

Viruses, Biometrics, Encryption

on

  • 576 views

 

Statistics

Views

Total Views
576
Views on SlideShare
576
Embed Views
0

Actions

Likes
0
Downloads
10
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Viruses, Biometrics, Encryption Viruses, Biometrics, Encryption Presentation Transcript

  • Viruses, Biometrics, Encryption LINDSEY MONROE PERIOD 2 COMPUTER APPLICATIONS
  • What was the Code Red Virus?  The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s II web server.
  • What was the “Love Bug” Virus? What damage did it do  A new computer virus spread around the world recently with a vengeance. This virus traveled via e- mail messages entitled quot;I Love You,quot; crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus.
  • What is Biometric Computer Security?  biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security.
  • Give an example of Phishing Scheme?  Always remember, companies like Google, eBay or Amazon will never send you an email asking for account details and most companies will never send you an insecure (http://) link instead of a secure (https://) link. Here’s a copy of an email I received today… Dear Google AdWords customer! In order to confirm your contact details, please click the link below: http://adwords.google.com/accounts/VE?service=adwords&c=3378 5003324529761 This should take you directly to the Google AdWords Form. Thank you for choosing AdWords. We look forward to providing you with the most effective advertising available. Sincerely, The Google AdWords Team When hovering over the link in the email, the real url is … http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adword s
  • What are 3 advantages of Biometric Security?  Three Advantages Include:  A. Will give you 100% accuracy and cant be hacked by anyone.  B. Many different types including physical, and behavioral.  C. Tougher to steal the information  D. Cheap
  • 2 disadvantages of Biometric Security  Expensive  Invasion of privacy
  • How does Anti Virus Software combat Viruses? 陿蚟陿翿 computer software used to  Antivirus software (or anti-virus) is identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.
  • What type of information should be encrypted? 3 Examples encryption is the process of transforming  information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).