Code Red Virus The  Code Red worm  was a computer worm observed on the Internet on July 13, 2001. It attacked computers ru...
The “Love Bug” Virus The Love Bug was a computer virus that hit numerous computers in 2000, when it was sent as an attachm...
Biometric Computer Security <ul><li>Biometrics are methods for uniquely recognizing humans based upon one or more physical...
Phishing Scheme Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usern...
Advantages of Biometric Security -Increase security - Provide a convenient and low-cost additional tier of security. - Red...
Disadvantages of Biometric Security -It is found that with age, the voice of a person differs -For people affected with di...
Anti Virus Software Antivirus software is computer software used to identify and remove computer viruses, as well as many ...
What kinds of information should be Encrypted? <ul><li>Credit card numbers </li></ul><ul><li>Passwords </li></ul><ul><li>P...
Upcoming SlideShare
Loading in …5
×

Computer Infections

378 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
378
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Computer Infections

  1. 2. Code Red Virus The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine
  2. 3. The “Love Bug” Virus The Love Bug was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text &quot;ILOVEYOU&quot; in the subject line. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. Most of the &quot;damage&quot; was the labor of getting rid of the virus. The Pentagon, CIA, and the British Parliament had to shut down their e-mail systems to get rid of the virus, as did most large corporations.
  3. 4. Biometric Computer Security <ul><li>Biometrics are methods for uniquely recognizing humans based upon one or more physical or behavioral traits. In information technology particularly, biometrics is a form of identity access management and access control. </li></ul><ul><li>Three examples include: </li></ul><ul><li>Fingerprint </li></ul><ul><li>Voice </li></ul><ul><li>Iris </li></ul>
  4. 5. Phishing Scheme Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In late 2006 a computer worm took over pages on MySpace and altered links to direct surfers to websites designed to steal login details.
  5. 6. Advantages of Biometric Security -Increase security - Provide a convenient and low-cost additional tier of security. - Reduce fraud by employing hard-to-forge technologies and materials. *-Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes.
  6. 7. Disadvantages of Biometric Security -It is found that with age, the voice of a person differs -For people affected with diabetes, the eyes get affected resulting in differences.  -Biometrics is an expensive security solution.
  7. 8. Anti Virus Software Antivirus software is computer software used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures.
  8. 9. What kinds of information should be Encrypted? <ul><li>Credit card numbers </li></ul><ul><li>Passwords </li></ul><ul><li>Phone numbers </li></ul><ul><li>Social security numbers </li></ul><ul><li>Medical Records </li></ul>

×