SlideShare a Scribd company logo
Viruses

Joe Faustyn
  Period 4
Code Red Virus
• The worm virus defaced up to 359,000 web
  sites
“Love bug” virus
• A virus that had an attachment that when
  opened would be sent to everyone in your
  address book and made changes to the user’s
  system
Biometric Computer Security
• Makes users use a finger print or eye scan
  instead of a password to gain access
Phishing Scheme
• Phishing is a way to trick people into giving
  them your password by making them think
  that they are on a trusted site.
Biometric Security
1. It allows only you to access your account
2. There is no code to crack and it is impossible
   to forge
3. Makes password security no longer a
   problem
Biometric Security
1. Only one person can access the account even
   if it is shared
2. Cuts on the finger may cause you to not gain
   access until healed
3. Can be very picky and take a while to grant
   access
Anti Virus Software combat Viruses
• Anti-virus software commonly finds viruses in
  bad emails and websites. It fights these
  viruses by identifying them and destroying
  them
Types of Encrypted Information
1. Social Security Number
2. Address
3. Phone number

More Related Content

What's hot

Jensen
JensenJensen
Jensen
morag
 
Anthony
AnthonyAnthony
Anthony
morag
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
Aleksandra Gavrilovska
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Phishing
PhishingPhishing
Phishing
alejandra reyes
 
Marleah
MarleahMarleah
Marleah
morag
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
MicroWorld Software Services Pvt Ltd
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
smithj12
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
Tajwar khan
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
RodrigoSantis3
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Smartphones
SmartphonesSmartphones
Smartphones
RoxLestrange
 
Rick
RickRick
Rick
morag
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
amiyadutta
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
SteveBrownNI
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
Arise Roby
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
techexpert2345
 
Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewall
Mobiwol
 

What's hot (19)

Jensen
JensenJensen
Jensen
 
Anthony
AnthonyAnthony
Anthony
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Phishing
PhishingPhishing
Phishing
 
Marleah
MarleahMarleah
Marleah
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
Internet security
Internet securityInternet security
Internet security
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Rick
RickRick
Rick
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewall
 

Viewers also liked

Webinar: Online marketing update
Webinar: Online marketing updateWebinar: Online marketing update
Webinar: Online marketing update
LECTRIC
 
Projeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e BrunoProjeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e Bruno
mhfribeiro
 
Licking the PAR Problem
Licking the PAR ProblemLicking the PAR Problem
Licking the PAR Problem
MABSIV
 
[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yenenglishonecfl
 
Variados usos de la palabra "pico"
Variados usos de la palabra "pico"Variados usos de la palabra "pico"
Variados usos de la palabra "pico"
BARRATA
 
festival de nieve
festival de nievefestival de nieve
festival de nieve
patricia72
 
Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006
ranganatha2
 
From Best Practices to Next Practices in Microfinance
From Best Practices to  Next Practices in MicrofinanceFrom Best Practices to  Next Practices in Microfinance
From Best Practices to Next Practices in Microfinance
MABSIV
 
D02L01 M Damnjanovic
D02L01 M DamnjanovicD02L01 M Damnjanovic
D02L01 M Damnjanovic
SEENET-MTP
 
Recruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using DigitalRecruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using Digital
Brian Barela
 
De qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprenderDe qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprender
Andrés Romero
 
Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!
Usanov Aleksey
 
Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...
MABSIV
 
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with FluxesA. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
SEENET-MTP
 
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
SEENET-MTP
 
He l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friendsHe l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friends
Esen Sandıraz
 

Viewers also liked (20)

Webinar: Online marketing update
Webinar: Online marketing updateWebinar: Online marketing update
Webinar: Online marketing update
 
Projeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e BrunoProjeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e Bruno
 
Licking the PAR Problem
Licking the PAR ProblemLicking the PAR Problem
Licking the PAR Problem
 
[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen
 
Variados usos de la palabra "pico"
Variados usos de la palabra "pico"Variados usos de la palabra "pico"
Variados usos de la palabra "pico"
 
festival de nieve
festival de nievefestival de nieve
festival de nieve
 
Obradoiro comic
Obradoiro comicObradoiro comic
Obradoiro comic
 
kidou20150403
kidou20150403kidou20150403
kidou20150403
 
Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006
 
From Best Practices to Next Practices in Microfinance
From Best Practices to  Next Practices in MicrofinanceFrom Best Practices to  Next Practices in Microfinance
From Best Practices to Next Practices in Microfinance
 
D02L01 M Damnjanovic
D02L01 M DamnjanovicD02L01 M Damnjanovic
D02L01 M Damnjanovic
 
Recruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using DigitalRecruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using Digital
 
De qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprenderDe qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprender
 
Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!
 
Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...
 
Timetable
TimetableTimetable
Timetable
 
Jiji
JijiJiji
Jiji
 
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with FluxesA. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
 
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
 
He l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friendsHe l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friends
 

Similar to Viruses

Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
erowell
 
Computer Security
Computer SecurityComputer Security
Computer Security
tonik
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
Online reputation
Online reputationOnline reputation
Online reputation
Eslam Mohammed
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
jnallnmnl
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
lockyerj
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
robsworld
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
Syed Zeeshan Ali
 

Similar to Viruses (20)

Computer security
Computer securityComputer security
Computer security
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Online reputation
Online reputationOnline reputation
Online reputation
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 

More from faustynj

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
faustynj
 
Search Engines
Search EnginesSearch Engines
Search Engines
faustynj
 
Arpanet
ArpanetArpanet
Arpanet
faustynj
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
faustynj
 
Outside The Computer
Outside The ComputerOutside The Computer
Outside The Computer
faustynj
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computers
faustynj
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
faustynj
 

More from faustynj (7)

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Arpanet
ArpanetArpanet
Arpanet
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
 
Outside The Computer
Outside The ComputerOutside The Computer
Outside The Computer
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computers
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Viruses

  • 2. Code Red Virus • The worm virus defaced up to 359,000 web sites
  • 3. “Love bug” virus • A virus that had an attachment that when opened would be sent to everyone in your address book and made changes to the user’s system
  • 4. Biometric Computer Security • Makes users use a finger print or eye scan instead of a password to gain access
  • 5. Phishing Scheme • Phishing is a way to trick people into giving them your password by making them think that they are on a trusted site.
  • 6. Biometric Security 1. It allows only you to access your account 2. There is no code to crack and it is impossible to forge 3. Makes password security no longer a problem
  • 7. Biometric Security 1. Only one person can access the account even if it is shared 2. Cuts on the finger may cause you to not gain access until healed 3. Can be very picky and take a while to grant access
  • 8. Anti Virus Software combat Viruses • Anti-virus software commonly finds viruses in bad emails and websites. It fights these viruses by identifying them and destroying them
  • 9. Types of Encrypted Information 1. Social Security Number 2. Address 3. Phone number