SlideShare a Scribd company logo
1 of 28
Friday, March 10, 2017 1
Friday, March 10, 2017 2
Presented to
Dr. Saad Meson
Presented by
*Waqar Akram (17)
Shezra Atta (07)
Mahnoor Shahid(109)
Zeeshan Hameed(10)
Bscs(3rd Morning)
Time: 20 Mnts
Slides = 28
Friday, March 10, 2017 3
Presentation ON
Facebook Protection through
Finger Print and DNA Coding
Friday, March 10, 2017 4
Facebook
Introduced And Purpose
Is It Safe?
Drawbacks
Hackers
How To Prevent?
Finger Prints
How its Work?
DNA
Is it Programming Langusge?
Friday, March 10, 2017 5
WHAT IS FACEBOOK?
Friday, March 10, 2017 6
launched on February 4, 2004. It was founded by Mark Zuckerberg with his
college roommates and fellow Harvard University student Eduardo Savarin.
Mark Zuckerberg created Facebook in his Harvard dorm room.
Friday, March 10, 2017
7
Friday, March 10, 2017 8
Overall, Facebook as a website is a pretty safe
place. There is built-in security that helps to
protect you and your information. One primary
level of security that Facebook uses is
called Secure Socket Layer (SSL).
With all the reports of companies getting
hacked, information being stolen, as well as
the whole personal identity theft issue, you
may be left wondering
whether Facebook is safe to use.
IS FACEBOOK SAFE?
Friday, March 10, 2017
9
Phishing is still
the most
popular
method of
hacking
facebook.
Millions of Facebook users
access Facebook through
their mobile phones. In
case the hacker can gain
access to the victims
mobile phone then he can
probably gain access to
his/her Facebook account
Keylogging is the easiest
way to hack a Facebook
password. Keylogging
sometimes can be so
dangerous that even a
person with good
knowledge of computers
can fall for it.
Almost 80% percent people
use stored passwords in their
browser to access the
Facebook. This is quite
convenient, but can
sometimes be extremely
dangerous. Stealer's are
software's specially designed
to capture the saved
passwords stored in the
victims Internet browser.
Drawbacks of
Facebook
Security
Friday, March 10, 2017
10
Sometimes a
hacker uses
the Facebook
account to
spread viruses
and spam
Hackers may
also use a
person's
Facebook
account to ask
their Facebook
friends for
money
Hackers also
may hack into
a person's
Facebook
account for
various
reasons
Friday, March 10, 2017 11
The latest example of using many people's
Facebook pages to spread viruses was the
various pornographic and violent pictures
that were found on Facebook in November
This break of security caused many users to
fear their vulnerability to more malicious
attacks on the social networking giant in
the future.
Some users deactivated their accounts after
these attacks occurred.
Friday, March 10, 2017 12
“The term "biometrics" is derived from
the Greek words "bio" meaning life and
"metric" meaning to measure”.
Friday, March 10, 2017 13
 Biometrics through finger print.
Friday, March 10, 2017
14
 Authentication by biometric verification is
becoming increasingly common in corporate and
public security systems, consumer electronics,
and point-of-sale applications.
 In addition to security, the driving force behind
biometric verification has been convenience, as
there are no passwords to remember or security
tokens to carry.
eg.
Measuring someone’s gait doesn’t even require a
contact with the person.
Fingerprint recognition
refers to the automated method of verifying a match between two
human fingerprints.
Fingerprints are one of many forms of biometrics used to identify
individuals and verify their identity.
 Scanning process
In this step take the skectech of finger print
 Processer
process the skectech and convert into binary code
 Storage
Store this binary code in the database
Friday, March 10, 2017 19
Fingerprint
authentication
technology is no
longer going to be
reserved for secret
high clearance
government
facilities – we get to
use fingerprint
clearance for
accessing email,
logging into social
networks like
Facebook or
Twitter, and
anything else that
requires a password.
Finger code Biometric
DNA
Friday, March 10, 2017 20
Friday, March 10, 2017 21
DNA Diagram
DNA is not only a
complex and self-
contained programming
language for life, but also
a pattern representation
system that efficiently
stores massive amounts of
information and provides
built-in mechanisms for
environmental
adaptation.
Friday, March 10, 2017 22
 From IT point of view the DNA is a
virtual machine with its own machine
code.
 The memory addresses contain 2 bits
00,01,10,11 which are named A,G,T,C
(A,G,U,C).
 Each 3 memory address build a machine
code instruction, named “codon”. This is
6 bits.
 The number of possible instructions 64.
 The program begins with an “AUG”
(methionin) entry point, and there are 3
possible exit point. Just like a computer
program. Instructions can create 20
amino acids.
IS DNA A PROGRAMMING LANGUAGE?
 It has been used once to make a 4-ary arithmetic system,
followed by a very simple computer (see MAYA-II) that
excels at tic-tac-toe.
 But it's not a programming language. It's not even actually
an arithmetic system (although it can be used to symbolically
create one).
 It's not a program. It's more like a blueprint, where the
positions of the codes represent where to stick amino acids
together to form proteins. The proteins are molecular
machines that perform single tasks.
 Computers store data in two-valued bits,
grouped as bytes of 7 or more bits (for
ASCII). One byte holds 2^7=128 unique
values.
 DNA stores data in four-valued base pairs,
which RNA then groups as codons of 3
pairs. One codon holds 4^3=2^6=64
unique values.
 A sequence of base pairs that convey
biological information is called a gene.
DNA includes extra information to express
or suppress specific genes. Each gene has
at least one bit of information for
expression or suppression.
 Computer files may be measured in
megabytes or gigabytes: millions or
billions of bytes. One CD-ROM disc may
store about 710 MB. Modern solid-state
memory and disk drives can store
gigabytes.
The thing I want to represent is that I want to
prepare an application of finger print
authentication so that our login should require our
fingerprint for safety purpose on fb. The main and
distinguish idea that I want to represent that I want
to made a DNA coding detector sensor so that the
owner of the appliance should already code its DNA
coding sequence in its appliance. Whenever he or
she want to login, the sensor should detect its DNA
sequence code in order to avoid hacking and misuse
of information. If the detected code matched with
the user code, the computer will login automatically
otherwise it will reject the provided code.
Friday, March 10, 2017 26
Any Question?
Friday, March 10, 2017 27
Friday, March 10, 2017 28

More Related Content

Similar to Facebook Privacy

Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityPankaj Choudhary
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?lorzinian
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these daysEssaysREasy
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of ITMichael Lew
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big datajournalBEEI
 
When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...Shujun Li
 
Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threatsPrakash Poudel
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learningPadmaSelvaraj4
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamentalAnkit Sand
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library ProgramRino Landa
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 

Similar to Facebook Privacy (20)

Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
 
When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...
 
Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threats
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learning
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
Online Security
Online SecurityOnline Security
Online Security
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 

Recently uploaded

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Facebook Privacy

  • 3. Presented to Dr. Saad Meson Presented by *Waqar Akram (17) Shezra Atta (07) Mahnoor Shahid(109) Zeeshan Hameed(10) Bscs(3rd Morning) Time: 20 Mnts Slides = 28 Friday, March 10, 2017 3
  • 4. Presentation ON Facebook Protection through Finger Print and DNA Coding Friday, March 10, 2017 4
  • 5. Facebook Introduced And Purpose Is It Safe? Drawbacks Hackers How To Prevent? Finger Prints How its Work? DNA Is it Programming Langusge? Friday, March 10, 2017 5
  • 6. WHAT IS FACEBOOK? Friday, March 10, 2017 6
  • 7. launched on February 4, 2004. It was founded by Mark Zuckerberg with his college roommates and fellow Harvard University student Eduardo Savarin. Mark Zuckerberg created Facebook in his Harvard dorm room. Friday, March 10, 2017 7
  • 9. Overall, Facebook as a website is a pretty safe place. There is built-in security that helps to protect you and your information. One primary level of security that Facebook uses is called Secure Socket Layer (SSL). With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use. IS FACEBOOK SAFE? Friday, March 10, 2017 9
  • 10. Phishing is still the most popular method of hacking facebook. Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser. Drawbacks of Facebook Security Friday, March 10, 2017 10
  • 11. Sometimes a hacker uses the Facebook account to spread viruses and spam Hackers may also use a person's Facebook account to ask their Facebook friends for money Hackers also may hack into a person's Facebook account for various reasons Friday, March 10, 2017 11
  • 12. The latest example of using many people's Facebook pages to spread viruses was the various pornographic and violent pictures that were found on Facebook in November This break of security caused many users to fear their vulnerability to more malicious attacks on the social networking giant in the future. Some users deactivated their accounts after these attacks occurred. Friday, March 10, 2017 12
  • 13. “The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure”. Friday, March 10, 2017 13
  • 14.  Biometrics through finger print. Friday, March 10, 2017 14
  • 15.  Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics, and point-of-sale applications.  In addition to security, the driving force behind biometric verification has been convenience, as there are no passwords to remember or security tokens to carry. eg. Measuring someone’s gait doesn’t even require a contact with the person.
  • 16. Fingerprint recognition refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.
  • 17.
  • 18.  Scanning process In this step take the skectech of finger print  Processer process the skectech and convert into binary code  Storage Store this binary code in the database
  • 19. Friday, March 10, 2017 19
  • 20. Fingerprint authentication technology is no longer going to be reserved for secret high clearance government facilities – we get to use fingerprint clearance for accessing email, logging into social networks like Facebook or Twitter, and anything else that requires a password. Finger code Biometric DNA Friday, March 10, 2017 20
  • 21. Friday, March 10, 2017 21
  • 22. DNA Diagram DNA is not only a complex and self- contained programming language for life, but also a pattern representation system that efficiently stores massive amounts of information and provides built-in mechanisms for environmental adaptation. Friday, March 10, 2017 22
  • 23.  From IT point of view the DNA is a virtual machine with its own machine code.  The memory addresses contain 2 bits 00,01,10,11 which are named A,G,T,C (A,G,U,C).  Each 3 memory address build a machine code instruction, named “codon”. This is 6 bits.  The number of possible instructions 64.  The program begins with an “AUG” (methionin) entry point, and there are 3 possible exit point. Just like a computer program. Instructions can create 20 amino acids.
  • 24. IS DNA A PROGRAMMING LANGUAGE?  It has been used once to make a 4-ary arithmetic system, followed by a very simple computer (see MAYA-II) that excels at tic-tac-toe.  But it's not a programming language. It's not even actually an arithmetic system (although it can be used to symbolically create one).  It's not a program. It's more like a blueprint, where the positions of the codes represent where to stick amino acids together to form proteins. The proteins are molecular machines that perform single tasks.
  • 25.  Computers store data in two-valued bits, grouped as bytes of 7 or more bits (for ASCII). One byte holds 2^7=128 unique values.  DNA stores data in four-valued base pairs, which RNA then groups as codons of 3 pairs. One codon holds 4^3=2^6=64 unique values.  A sequence of base pairs that convey biological information is called a gene. DNA includes extra information to express or suppress specific genes. Each gene has at least one bit of information for expression or suppression.  Computer files may be measured in megabytes or gigabytes: millions or billions of bytes. One CD-ROM disc may store about 710 MB. Modern solid-state memory and disk drives can store gigabytes.
  • 26. The thing I want to represent is that I want to prepare an application of finger print authentication so that our login should require our fingerprint for safety purpose on fb. The main and distinguish idea that I want to represent that I want to made a DNA coding detector sensor so that the owner of the appliance should already code its DNA coding sequence in its appliance. Whenever he or she want to login, the sensor should detect its DNA sequence code in order to avoid hacking and misuse of information. If the detected code matched with the user code, the computer will login automatically otherwise it will reject the provided code. Friday, March 10, 2017 26
  • 28. Friday, March 10, 2017 28