Viruses, Biometrics and Encryption By: Joanna Smith
Code Red Virus <ul><li>This virus will deface websites. </li></ul>
Love Bug Virus <ul><li>A new computer virus spread around the world recently with a vengeance. This virus traveled in e-ma...
Biometric Computer Security <ul><li>Instead of using passwords you use very specific ways of identifying yourself. </li></...
Phishing Scheme <ul><li>An example of a phishing scheme would be an e-mail entitled : FREE VACATION TO THE BAHAMAS. You wo...
3 Advantages of Biometric security <ul><li>Access to secured facilities </li></ul><ul><li>Access to classified information...
3 Disadvantages of biometric security <ul><li>Cost of implementing it </li></ul><ul><li>Could lead to abuses in personal i...
Anti-virus software <ul><li>Antivirus software are computer programs that attempt to identify, neutralize or eliminate mal...
What info. Should be encrypted <ul><li>Credit card info </li></ul><ul><li>Insurance info </li></ul><ul><li>Social security...
Upcoming SlideShare
Loading in …5
×

Viruses, Biometrics And Encryption

431 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
431
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Viruses, Biometrics And Encryption

  1. 1. Viruses, Biometrics and Encryption By: Joanna Smith
  2. 2. Code Red Virus <ul><li>This virus will deface websites. </li></ul>
  3. 3. Love Bug Virus <ul><li>A new computer virus spread around the world recently with a vengeance. This virus traveled in e-mail messages titled &quot;I Love You,&quot; damaging government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus. </li></ul>
  4. 4. Biometric Computer Security <ul><li>Instead of using passwords you use very specific ways of identifying yourself. </li></ul><ul><li>Examples: </li></ul><ul><li>Fingerprint </li></ul><ul><li>Retina </li></ul><ul><li>Voice Recognition </li></ul>
  5. 5. Phishing Scheme <ul><li>An example of a phishing scheme would be an e-mail entitled : FREE VACATION TO THE BAHAMAS. You would then have to enter your personal and financial information that would be stolen. </li></ul>
  6. 6. 3 Advantages of Biometric security <ul><li>Access to secured facilities </li></ul><ul><li>Access to classified information </li></ul><ul><li>Access to computer and office systems. </li></ul>
  7. 7. 3 Disadvantages of biometric security <ul><li>Cost of implementing it </li></ul><ul><li>Could lead to abuses in personal information </li></ul><ul><li>Public concern over safety issues </li></ul>
  8. 8. Anti-virus software <ul><li>Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. </li></ul>
  9. 9. What info. Should be encrypted <ul><li>Credit card info </li></ul><ul><li>Insurance info </li></ul><ul><li>Social security number </li></ul>

×