Your SlideShare is downloading. ×
Electronic Communications Slide Show 3
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Electronic Communications Slide Show 3


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Code Red Virus-Code Red is a worm that exploits a vulnerability in one of the add-in components that is installed by default in Microsoft's web server: Internet Information Server. There have been several variants of Code Red with side effects ranging from defaced web pages to changing system configurations and installing a Trojan Horse that will allow access to the compromised system, should the initial entry/infection point be closed. Nitin Goel Period 2
  • 2. “Love Bug” Virus A new computer virus spread around the world recently  with a vengeance. This virus traveled via e-mail messages entitled quot;I Love You,quot; crippling government and business computers in Asia, Europe, and the United States. It appears that only Microsoft's Outlook and Outlook Express are the only e-mail programs affected; however, the virus is also spreading via mIRC, a popular chat program.
  • 3. Biometric Computer Security ◘ Biometric computer security  systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For example, it is used for finger prints, eye scanning, and finger scanning.
  • 4. Phishing Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they  are asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal  the user’s information.
  • 5. Biometric Security Some advantages include:  Increase security - Provide a convenient - and low-cost additional tier of security. - Replace hard-to-remember passwords which may be shared or observed. - Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
  • 6. Biometric Security Some disadvantages include:  fingerprints of a person keep on changing from time to time. - This can lead to the security devise having problem in identifying your fingerprint. These security devices incorporate sensors, which may be - touched by several individuals. Touching these sensors again an again can lead to health problems. Public perceptions and privacy concerns of criminal - implications may happen.
  • 7. Anti Virus Software Antivirus software is computer software used to  identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.
  • 8. Encryption The type of information that should be  encrypted include: - Passwords - Credit Card Numbers - Phone Numbers - Social Security Numbers