Period 4 March 6, 2009 Makayla Holland
Red Code Virus <ul><li>The  Code Red worm  was a  computer worm  observed on the  Internet  on  July 13 ,  2001 . It attac...
Love Bug <ul><li>ILOVEYOU  was a  computer virus  that hit numerous computers in 2000, when it was sent as an attachment t...
Biometric Computer Security <ul><li>Biometric computer security systems tie a unique physical attribute of a user to the I...
Phishing Scheme <ul><li>The act of sending an  e-mail  to a user falsely claiming to be an established legitimate enterpri...
Positive-biometric security <ul><li>It is used in security and access control applications to mean measurable physical cha...
Antivirus software <ul><li>Antivirus software works by checking files, programs, emails and disks for viruses, worms and T...
Encryption <ul><li>confidential information, student grade books, sensitive personal/financial information </li></ul>
Upcoming SlideShare
Loading in …5
×

Security

376 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
376
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security

  1. 1. Period 4 March 6, 2009 Makayla Holland
  2. 2. Red Code Virus <ul><li>The Code Red worm was a computer worm observed on the Internet on July 13 , 2001 . It attacked computers running Microsoft's IIS web server . The most in-depth research on the worm was performed by the programmers at eEye Digital Security </li></ul>
  3. 3. Love Bug <ul><li>ILOVEYOU was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text &quot;ILOVEYOU&quot; in the subject line. The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of &quot;ILOVEYOU&quot; and an attachment &quot;LOVE-LETTER-FOR-YOU.TXT.vbs&quot;. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system. </li></ul>
  4. 4. Biometric Computer Security <ul><li>Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. </li></ul>
  5. 5. Phishing Scheme <ul><li>The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft </li></ul><ul><li>Sending an email to steal passwords, identity, etc. </li></ul>
  6. 6. Positive-biometric security <ul><li>It is used in security and access control applications to mean measurable physical characteristics of a person that can be checked on an automated basis </li></ul><ul><li>Security personnel look for biometric data that does not change over the course of your life </li></ul><ul><li>biometric identification is becoming commonplace as hardware and software come down in price. </li></ul>
  7. 7. Antivirus software <ul><li>Antivirus software works by checking files, programs, emails and disks for viruses, worms and Trojans, and more recently, spyware. What it is actually doing is comparing what it finds with a list of known viruses - this list is a virus file or virus definitions file. The software will unpack files to look at and check them, and it then repacks them if they are safe. </li></ul>
  8. 8. Encryption <ul><li>confidential information, student grade books, sensitive personal/financial information </li></ul>

×