(3 11 09)viruses, biometrics, encryption

8
Code Red Virus The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s IIS web server.

Upload: chairesj

Post on 21-May-2015

180 views

Category:

Technology


2 download

DESCRIPTION

Jordan Chaires P.4.

TRANSCRIPT

Page 1: (3 11 09)Viruses, Biometrics, Encryption

Code Red Virus

The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s IIS web server.

Page 2: (3 11 09)Viruses, Biometrics, Encryption

“Love Bug” Virus

ILOVEYOU was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line.

Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system.

Page 3: (3 11 09)Viruses, Biometrics, Encryption

Biometric Computer Security

Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access.

Ex: fingerprint, voice activation, or eye identification

Page 4: (3 11 09)Viruses, Biometrics, Encryption

Phishing Scheme

Phishing Scheme is a fake site used to convince you to insert your personal and financial information so they can steal it.

Page 5: (3 11 09)Viruses, Biometrics, Encryption

Biometric Security Advantages

3 advantages of Biometric Security include people cannot steal your identity without you being present, it’s harder to steal identities, and you will be the only one able to access whatever technology has biometric security.

Page 6: (3 11 09)Viruses, Biometrics, Encryption

Biometric Security Disadvantages

3 Biometric Security disadvantages include: your children won’t be able to access the computer without you, if you feel sick the voice security might not pick you up, or if you break the security device then you will never be able to get the information off the computer.

Page 7: (3 11 09)Viruses, Biometrics, Encryption

Anti Virus Software Against Viruses

Anti Virus Software combat Viruses by first detecting them, then containing them, then destroying them.

Page 8: (3 11 09)Viruses, Biometrics, Encryption

Encrypted Information

Information that should be encrypted is personal, financial, and any other information that could help someone steal your identity.

Ex: bank site, email, or chatting sites