(3 11 09)viruses, biometrics, encryption
DESCRIPTION
Jordan Chaires P.4.TRANSCRIPT
![Page 1: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/1.jpg)
Code Red Virus
The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s IIS web server.
![Page 2: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/2.jpg)
“Love Bug” Virus
ILOVEYOU was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line.
Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system.
![Page 3: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/3.jpg)
Biometric Computer Security
Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access.
Ex: fingerprint, voice activation, or eye identification
![Page 4: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/4.jpg)
Phishing Scheme
Phishing Scheme is a fake site used to convince you to insert your personal and financial information so they can steal it.
![Page 5: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/5.jpg)
Biometric Security Advantages
3 advantages of Biometric Security include people cannot steal your identity without you being present, it’s harder to steal identities, and you will be the only one able to access whatever technology has biometric security.
![Page 6: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/6.jpg)
Biometric Security Disadvantages
3 Biometric Security disadvantages include: your children won’t be able to access the computer without you, if you feel sick the voice security might not pick you up, or if you break the security device then you will never be able to get the information off the computer.
![Page 7: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/7.jpg)
Anti Virus Software Against Viruses
Anti Virus Software combat Viruses by first detecting them, then containing them, then destroying them.
![Page 8: (3 11 09)Viruses, Biometrics, Encryption](https://reader036.vdocument.in/reader036/viewer/2022082702/555db243d8b42a68328b4dcf/html5/thumbnails/8.jpg)
Encrypted Information
Information that should be encrypted is personal, financial, and any other information that could help someone steal your identity.
Ex: bank site, email, or chatting sites