Viruses, Biometrics And Encryption
Upcoming SlideShare
Loading in...5
×
 

Viruses, Biometrics And Encryption

on

  • 610 views

 

Statistics

Views

Total Views
610
Views on SlideShare
610
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Viruses, Biometrics And Encryption Viruses, Biometrics And Encryption Presentation Transcript

  • Viruses, Biometrics and Encryption By: Joanna Smith
  • Code Red Virus
    • This virus will deface websites.
  • Love Bug Virus
    • A new computer virus spread around the world recently with a vengeance. This virus traveled in e-mail messages titled "I Love You," damaging government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus.
  • Biometric Computer Security
    • Instead of using passwords you use very specific ways of identifying yourself.
    • Examples:
    • Fingerprint
    • Retina
    • Voice Recognition
  • Phishing Scheme
    • An example of a phishing scheme would be an e-mail entitled : FREE VACATION TO THE BAHAMAS. You would then have to enter your personal and financial information that would be stolen.
  • 3 Advantages of Biometric security
    • Access to secured facilities
    • Access to classified information
    • Access to computer and office systems.
  • 3 Disadvantages of biometric security
    • Cost of implementing it
    • Could lead to abuses in personal information
    • Public concern over safety issues
  • Anti-virus software
    • Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software.
  • What info. Should be encrypted
    • Credit card info
    • Insurance info
    • Social security number