SlideShare une entreprise Scribd logo
1  sur  9
Viruses, Biometrics,
    Encryption

    LINDSEY MONROE
        PERIOD 2
  COMPUTER APPLICATIONS
What was the Code Red Virus?

 The Code Red worm was a computer worm
 observed on the Internet on July 13, 2001. It
 attacked computers running Microsoft’s II web
 server.
What was the “Love Bug” Virus? What
            damage did it do

 A new computer virus spread around the world
 recently with a vengeance. This virus traveled via e-
 mail messages entitled quot;I Love You,quot; crippling
 government and business computers in Asia, Europe,
 and the United States. No immediate cure was
 known as experts were stunned by the speed and
 wide reach of the virus.
What is Biometric Computer Security?

 biometric computer security system requires the user to
  provide a fingerprint (or other biometric) to the system, which
  is then verified against a stored biometric template. Because
  fingerprints offer an additional factor of authentication, i.e.,
  something you are, in addition to something that you know
  (password), or have (token), biometric security systems offer
  significant improvements over traditional computer security.
Give an example of Phishing Scheme?

 Always remember, companies like Google, eBay or
    Amazon will never send you an email asking for
    account details and most companies will never send
    you an insecure (http://) link instead of a secure
    (https://) link.
Here’s a copy of an email I received today…
Dear Google AdWords customer!
In order to confirm your contact details, please click the link below:
http://adwords.google.com/accounts/VE?service=adwords&c=3378
    5003324529761
This should take you directly to the Google AdWords Form.
Thank you for choosing AdWords. We look forward to providing you
    with the most
    effective advertising available.
Sincerely,
The Google AdWords Team
When hovering over the link in the email, the real url is …
http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adword
    s
What are 3 advantages of Biometric
                Security?

 Three Advantages Include:
 A. Will give you 100% accuracy and cant be hacked
  by anyone.
 B. Many different types including physical, and
  behavioral.
 C. Tougher to steal the information
 D. Cheap
2 disadvantages of Biometric Security

 Expensive
 Invasion of privacy
How does Anti Virus Software combat
            Viruses? 陿蚟陿翿
                                     computer software used to
 Antivirus software (or anti-virus) is
  identify and remove computer viruses, as well as many other
  types of harmful computer software, collectively referred to as
  malware. While the first antivirus software was designed
  exclusively to combat computer viruses, most modern antivirus
  software can protect against a wide range of malware, including
  worms, rootkits, and Trojans.
What type of information should be
           encrypted? 3 Examples

    encryption is the process of transforming

    information (referred to as plaintext) using
    an algorithm (called cipher) to make it
    unreadable to anyone except those
    possessing special knowledge, usually
    referred to as a key. The result of the
    process is encrypted information (in
    cryptography, referred to as ciphertext). In
    many contexts, the word encryption also
    implicitly refers to the reverse process,
    decryption (e.g. “software for encryption”
    can typically also perform decryption), to
    make the encrypted information readable
    again (i.e. to make it unencrypted).

Contenu connexe

Tendances

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
Patty Ramsey
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
umme ayesha
 

Tendances (20)

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
Slow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device CookiesSlow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device Cookies
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web security
Web securityWeb security
Web security
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Web Security: A Primer for Developers
Web Security: A Primer for DevelopersWeb Security: A Primer for Developers
Web Security: A Primer for Developers
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxPhishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 

En vedette

01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba
INÉS ARABIA DíAZ
 

En vedette (9)

A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Final report
Final reportFinal report
Final report
 
Ip security
Ip security Ip security
Ip security
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 

Similaire à Viruses, Biometrics, Encryption

Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 

Similaire à Viruses, Biometrics, Encryption (20)

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information security
Information securityInformation security
Information security
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Hamza
HamzaHamza
Hamza
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 

Plus de monroel (7)

Fjdaslhfwejkahsdkl
FjdaslhfwejkahsdklFjdaslhfwejkahsdkl
Fjdaslhfwejkahsdkl
 
Internet Citing
Internet CitingInternet Citing
Internet Citing
 
Internet Search
Internet SearchInternet Search
Internet Search
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
 
Outside Of The Computer Workstation
Outside Of The Computer WorkstationOutside Of The Computer Workstation
Outside Of The Computer Workstation
 
Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Viruses, Biometrics, Encryption

  • 1. Viruses, Biometrics, Encryption LINDSEY MONROE PERIOD 2 COMPUTER APPLICATIONS
  • 2. What was the Code Red Virus?  The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s II web server.
  • 3. What was the “Love Bug” Virus? What damage did it do  A new computer virus spread around the world recently with a vengeance. This virus traveled via e- mail messages entitled quot;I Love You,quot; crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus.
  • 4. What is Biometric Computer Security?  biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security.
  • 5. Give an example of Phishing Scheme?  Always remember, companies like Google, eBay or Amazon will never send you an email asking for account details and most companies will never send you an insecure (http://) link instead of a secure (https://) link. Here’s a copy of an email I received today… Dear Google AdWords customer! In order to confirm your contact details, please click the link below: http://adwords.google.com/accounts/VE?service=adwords&c=3378 5003324529761 This should take you directly to the Google AdWords Form. Thank you for choosing AdWords. We look forward to providing you with the most effective advertising available. Sincerely, The Google AdWords Team When hovering over the link in the email, the real url is … http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adword s
  • 6. What are 3 advantages of Biometric Security?  Three Advantages Include:  A. Will give you 100% accuracy and cant be hacked by anyone.  B. Many different types including physical, and behavioral.  C. Tougher to steal the information  D. Cheap
  • 7. 2 disadvantages of Biometric Security  Expensive  Invasion of privacy
  • 8. How does Anti Virus Software combat Viruses? 陿蚟陿翿 computer software used to  Antivirus software (or anti-virus) is identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.
  • 9. What type of information should be encrypted? 3 Examples encryption is the process of transforming  information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).