SlideShare a Scribd company logo
Task 1:
Some common biometric techniques include:
Fingerprint recognition
Signature dynamics
Iris scanning
Retina scanning
Voice prints
Face recognition
Select one of these biometric techniques and explain the
benefits and the vulnerabilities associated with that method in
3-4 paragraphs.
Task 2:
Do the following review questions:
10.1 What are three broad mechanisms that malware can use to
propagate?
10.2 What are four broad categories of payloads that malware
may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and
macro viruses?
10.6 What means can a worm use to access remote systems to
propagate?
10.7 What is a “drive-by-download” and how does it differ from
a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a
keylogger, spyware, and a rootkit? Can they all be present in the
same malware?
10.10 List some of the different levels in a system that a rootkit
may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be
located.
10.13 Briefly describe the four generations of antivirus
software.
10.14 How does behavior-blocking software work?
10.15 What is a distributed denial-of-service system?
Submit a Microsoft Word document

More Related Content

Similar to Task 1 Some common biometric techniques includeFingerp.docx

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
ijcsa
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starterIan Thiele
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
ManjuAppukuttan2
 
Answer the following questions- Question 1- You have implemented a sec.docx
Answer the following questions- Question 1- You have implemented a sec.docxAnswer the following questions- Question 1- You have implemented a sec.docx
Answer the following questions- Question 1- You have implemented a sec.docx
olsenlinnea427
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
Homework Help Online
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
IJNSA Journal
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf
aliradios
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
IJNSA Journal
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
IJNSA Journal
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdfCHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
ManjuAppukuttan2
 
Task 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docxTask 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docx
josies1
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
Teodoro Cipresso
 
A short course on computer viruses
A short course on computer virusesA short course on computer viruses
A short course on computer virusesUltraUploader
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
csandit
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 

Similar to Task 1 Some common biometric techniques includeFingerp.docx (20)

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
 
Answer the following questions- Question 1- You have implemented a sec.docx
Answer the following questions- Question 1- You have implemented a sec.docxAnswer the following questions- Question 1- You have implemented a sec.docx
Answer the following questions- Question 1- You have implemented a sec.docx
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf
 
Antivirus
AntivirusAntivirus
Antivirus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdfCHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
 
Task 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docxTask 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docx
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
A short course on computer viruses
A short course on computer virusesA short course on computer viruses
A short course on computer viruses
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 

More from josies1

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
josies1
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
josies1
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
josies1
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docx
josies1
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
josies1
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
josies1
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
josies1
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
josies1
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
josies1
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
josies1
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
josies1
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
josies1
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
josies1
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
josies1
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
josies1
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
josies1
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
josies1
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
josies1
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
josies1
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
josies1
 

More from josies1 (20)

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docx
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

Task 1 Some common biometric techniques includeFingerp.docx

  • 1. Task 1: Some common biometric techniques include: Fingerprint recognition Signature dynamics Iris scanning Retina scanning Voice prints Face recognition Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs. Task 2: Do the following review questions: 10.1 What are three broad mechanisms that malware can use to propagate? 10.2 What are four broad categories of payloads that malware
  • 2. may carry? 10.3 What are typical phases of operation of a virus or worm? 10.4 What mechanisms can a virus use to conceal itself? 10.5 What is the difference between machine-executable and macro viruses? 10.6 What means can a worm use to access remote systems to propagate? 10.7 What is a “drive-by-download” and how does it differ from a worm? 10.8 What is a “logic bomb”? 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware? 10.10 List some of the different levels in a system that a rootkit may use. 10.11 Describe some malware countermeasure elements. 10.12 List three places malware mitigation mechanisms may be located. 10.13 Briefly describe the four generations of antivirus software. 10.14 How does behavior-blocking software work? 10.15 What is a distributed denial-of-service system?
  • 3. Submit a Microsoft Word document