Electronic Communications Slide Show 3
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Electronic Communications Slide Show 3

on

  • 1,018 views

 

Statistics

Views

Total Views
1,018
Views on SlideShare
1,018
Embed Views
0

Actions

Likes
0
Downloads
8
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Electronic Communications Slide Show 3 Presentation Transcript

  • 1. Code Red Virus-Code Red is a worm that exploits a vulnerability in one of the add-in components that is installed by default in Microsoft's web server: Internet Information Server. There have been several variants of Code Red with side effects ranging from defaced web pages to changing system configurations and installing a Trojan Horse that will allow access to the compromised system, should the initial entry/infection point be closed. Nitin Goel Period 2
  • 2. “Love Bug” Virus A new computer virus spread around the world recently  with a vengeance. This virus traveled via e-mail messages entitled quot;I Love You,quot; crippling government and business computers in Asia, Europe, and the United States. It appears that only Microsoft's Outlook and Outlook Express are the only e-mail programs affected; however, the virus is also spreading via mIRC, a popular chat program.
  • 3. Biometric Computer Security ◘ Biometric computer security  systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For example, it is used for finger prints, eye scanning, and finger scanning.
  • 4. Phishing Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they  are asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal  the user’s information.
  • 5. Biometric Security Some advantages include:  Increase security - Provide a convenient - and low-cost additional tier of security. - Replace hard-to-remember passwords which may be shared or observed. - Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
  • 6. Biometric Security Some disadvantages include:  fingerprints of a person keep on changing from time to time. - This can lead to the security devise having problem in identifying your fingerprint. These security devices incorporate sensors, which may be - touched by several individuals. Touching these sensors again an again can lead to health problems. Public perceptions and privacy concerns of criminal - implications may happen.
  • 7. Anti Virus Software Antivirus software is computer software used to  identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.
  • 8. Encryption The type of information that should be  encrypted include: - Passwords - Credit Card Numbers - Phone Numbers - Social Security Numbers