SlideShare uma empresa Scribd logo
1 de 9
Viruses, Biometrics,
    Encryption

    LINDSEY MONROE
        PERIOD 2
  COMPUTER APPLICATIONS
What was the Code Red Virus?

 The Code Red worm was a computer worm
 observed on the Internet on July 13, 2001. It
 attacked computers running Microsoft’s II web
 server.
What was the “Love Bug” Virus? What
            damage did it do

 A new computer virus spread around the world
 recently with a vengeance. This virus traveled via e-
 mail messages entitled quot;I Love You,quot; crippling
 government and business computers in Asia, Europe,
 and the United States. No immediate cure was
 known as experts were stunned by the speed and
 wide reach of the virus.
What is Biometric Computer Security?

 biometric computer security system requires the user to
  provide a fingerprint (or other biometric) to the system, which
  is then verified against a stored biometric template. Because
  fingerprints offer an additional factor of authentication, i.e.,
  something you are, in addition to something that you know
  (password), or have (token), biometric security systems offer
  significant improvements over traditional computer security.
Give an example of Phishing Scheme?

 Always remember, companies like Google, eBay or
    Amazon will never send you an email asking for
    account details and most companies will never send
    you an insecure (http://) link instead of a secure
    (https://) link.
Here’s a copy of an email I received today…
Dear Google AdWords customer!
In order to confirm your contact details, please click the link below:
http://adwords.google.com/accounts/VE?service=adwords&c=3378
    5003324529761
This should take you directly to the Google AdWords Form.
Thank you for choosing AdWords. We look forward to providing you
    with the most
    effective advertising available.
Sincerely,
The Google AdWords Team
When hovering over the link in the email, the real url is …
http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adword
    s
What are 3 advantages of Biometric
                Security?

 Three Advantages Include:
 A. Will give you 100% accuracy and cant be hacked
  by anyone.
 B. Many different types including physical, and
  behavioral.
 C. Tougher to steal the information
 D. Cheap
2 disadvantages of Biometric Security

 Expensive
 Invasion of privacy
How does Anti Virus Software combat
            Viruses? 陿蚟陿翿
                                     computer software used to
 Antivirus software (or anti-virus) is
  identify and remove computer viruses, as well as many other
  types of harmful computer software, collectively referred to as
  malware. While the first antivirus software was designed
  exclusively to combat computer viruses, most modern antivirus
  software can protect against a wide range of malware, including
  worms, rootkits, and Trojans.
What type of information should be
           encrypted? 3 Examples

    encryption is the process of transforming

    information (referred to as plaintext) using
    an algorithm (called cipher) to make it
    unreadable to anyone except those
    possessing special knowledge, usually
    referred to as a key. The result of the
    process is encrypted information (in
    cryptography, referred to as ciphertext). In
    many contexts, the word encryption also
    implicitly refers to the reverse process,
    decryption (e.g. “software for encryption”
    can typically also perform decryption), to
    make the encrypted information readable
    again (i.e. to make it unencrypted).

Mais conteúdo relacionado

Mais procurados

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
Slow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device CookiesSlow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device CookiesAnton Dedov
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Web Security: A Primer for Developers
Web Security: A Primer for DevelopersWeb Security: A Primer for Developers
Web Security: A Primer for DevelopersMike North
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Web security presentation
Web security presentationWeb security presentation
Web security presentationJohn Staveley
 
Phishing Education
Phishing EducationPhishing Education
Phishing EducationBrandProtect
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxPhishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxM Nadeem Qazi
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 

Mais procurados (20)

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
Slow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device CookiesSlow Down Online Guessing Attacks with Device Cookies
Slow Down Online Guessing Attacks with Device Cookies
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web security
Web securityWeb security
Web security
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Web Security: A Primer for Developers
Web Security: A Primer for DevelopersWeb Security: A Primer for Developers
Web Security: A Primer for Developers
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxPhishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 

Destaque

A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeySougata Das
 
01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de sambaINÉS ARABIA DíAZ
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint RecognitionSecurity Session
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 

Destaque (9)

A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba01 compartir carpetas con ubuntu server a partir de samba
01 compartir carpetas con ubuntu server a partir de samba
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Final report
Final reportFinal report
Final report
 
Ip security
Ip security Ip security
Ip security
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 

Semelhante a Viruses, Biometrics, Encryption

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 

Semelhante a Viruses, Biometrics, Encryption (20)

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information security
Information securityInformation security
Information security
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Hamza
HamzaHamza
Hamza
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 

Mais de monroel

Fjdaslhfwejkahsdkl
FjdaslhfwejkahsdklFjdaslhfwejkahsdkl
Fjdaslhfwejkahsdklmonroel
 
Internet Citing
Internet CitingInternet Citing
Internet Citingmonroel
 
Internet Search
Internet SearchInternet Search
Internet Searchmonroel
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communicationmonroel
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systemsmonroel
 
Outside Of The Computer Workstation
Outside Of The Computer WorkstationOutside Of The Computer Workstation
Outside Of The Computer Workstationmonroel
 
Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1monroel
 

Mais de monroel (7)

Fjdaslhfwejkahsdkl
FjdaslhfwejkahsdklFjdaslhfwejkahsdkl
Fjdaslhfwejkahsdkl
 
Internet Citing
Internet CitingInternet Citing
Internet Citing
 
Internet Search
Internet SearchInternet Search
Internet Search
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
 
Outside Of The Computer Workstation
Outside Of The Computer WorkstationOutside Of The Computer Workstation
Outside Of The Computer Workstation
 
Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Viruses, Biometrics, Encryption

  • 1. Viruses, Biometrics, Encryption LINDSEY MONROE PERIOD 2 COMPUTER APPLICATIONS
  • 2. What was the Code Red Virus?  The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s II web server.
  • 3. What was the “Love Bug” Virus? What damage did it do  A new computer virus spread around the world recently with a vengeance. This virus traveled via e- mail messages entitled quot;I Love You,quot; crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus.
  • 4. What is Biometric Computer Security?  biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security.
  • 5. Give an example of Phishing Scheme?  Always remember, companies like Google, eBay or Amazon will never send you an email asking for account details and most companies will never send you an insecure (http://) link instead of a secure (https://) link. Here’s a copy of an email I received today… Dear Google AdWords customer! In order to confirm your contact details, please click the link below: http://adwords.google.com/accounts/VE?service=adwords&c=3378 5003324529761 This should take you directly to the Google AdWords Form. Thank you for choosing AdWords. We look forward to providing you with the most effective advertising available. Sincerely, The Google AdWords Team When hovering over the link in the email, the real url is … http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adword s
  • 6. What are 3 advantages of Biometric Security?  Three Advantages Include:  A. Will give you 100% accuracy and cant be hacked by anyone.  B. Many different types including physical, and behavioral.  C. Tougher to steal the information  D. Cheap
  • 7. 2 disadvantages of Biometric Security  Expensive  Invasion of privacy
  • 8. How does Anti Virus Software combat Viruses? 陿蚟陿翿 computer software used to  Antivirus software (or anti-virus) is identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.
  • 9. What type of information should be encrypted? 3 Examples encryption is the process of transforming  information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).