Viruses, Biometrics, & Encryptions


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Viruses, Biometrics, & Encryptions

  1. 1. By Tori Small
  2. 2. <ul><li>The Code Red worm or Virus was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. They also gave the worm the phrase &quot;Hacked By Chinese!&quot;with which the worm defaced websites. Even though the worm was released on July 13, the largest group of infected computers was seen on July 19, 2001. By that time, the number of infected hosts reached 359,000 </li></ul>
  3. 3. <ul><li>This virus traveled via e-mail messages entitled &quot;I Love You,&quot; crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were shocked by the speed and wide reach of the virus. A worm is a special type of virus designed to spread from one computer to another over any type of network. Its job has been simplified by the Internet and e-mail, which allow the worm to strike countless computer systems in seconds. </li></ul>
  4. 4. <ul><li>a biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security. </li></ul><ul><li>Three Examples are: </li></ul><ul><li>Fingerprints </li></ul><ul><li>Eye scan </li></ul><ul><li>Voice Recognition </li></ul>
  5. 5. <ul><li>The first known direct attempt against a payment system affected E-gold in June 2001, which was followed by a &quot;post-9/11 id check&quot; shortly after the September 11 attacks on the World Trade Center. Both were viewed at the time as failures, but can now be seen as early experiments towards more fruitful attacks against banks. </li></ul>
  6. 6. <ul><li>Information is more difficult to steal </li></ul><ul><li>Systems may be less expensive than other high-tech security systems </li></ul><ul><li>Eliminates problems caused by lost ids or forgotten passwords. </li></ul>
  7. 7. <ul><li>It is found that with age the voice of a person differs. Also if they are sick or if the environment is too noisy then they may not authenticate correctly </li></ul><ul><li>For people affected with diabetes, their eyes are affected which results in differences with each scan </li></ul><ul><li>Biometrics can be expensive </li></ul>
  8. 8. <ul><li>Signature based detection </li></ul><ul><li>To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in pre-existing files, the entire file is searched, not just as a whole, but also in pieces. </li></ul>
  9. 9. <ul><li>Credit cards </li></ul><ul><li>Personal address and other similar information </li></ul><ul><li>Your social security number </li></ul>