Viruses, Biometrics, Encryption

9
LINDSEY MONROE PERIOD 2 COMPUTER APPLICATIONS Viruses, Biometrics, Encryption

Transcript of Viruses, Biometrics, Encryption

Page 1: Viruses, Biometrics, Encryption

L I N D S E Y M O N R O E

P E R I O D 2

C O M P U T E R A P P L I C A T I O N S

Viruses, Biometrics, Encryption

Page 2: Viruses, Biometrics, Encryption

What was the Code Red Virus?

The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft’s II web server.

Page 3: Viruses, Biometrics, Encryption

What was the “Love Bug” Virus? What damage did it do

A new computer virus spread around the world recently with a vengeance. This virus traveled via e-mail messages entitled "I Love You," crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were stunned by the speed and wide reach of the virus.

Page 4: Viruses, Biometrics, Encryption

What is Biometric Computer Security?

biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security.

Page 5: Viruses, Biometrics, Encryption

Give an example of Phishing Scheme?

Always remember, companies like Google, eBay or Amazon will never send you an email asking for account details and most companies will never send you an insecure (http://) link instead of a secure (https://) link.

Here’s a copy of an email I received today…

Dear Google AdWords customer!

In order to confirm your contact details, please click the link below:

http://adwords.google.com/accounts/VE?service=adwords&c=33785003324529761

This should take you directly to the Google AdWords Form.

Thank you for choosing AdWords. We look forward to providing you with the mosteffective advertising available.

Sincerely,

The Google AdWords Team

When hovering over the link in the email, the real url is …

http://adwordsgoogle.com.idir170.eu/accounts/VE?service=adwords

Page 6: Viruses, Biometrics, Encryption

What are 3 advantages of Biometric Security?

Three Advantages Include:

A. Will give you 100% accuracy and cant be hacked by anyone.

B. Many different types including physical, and behavioral.

C. Tougher to steal the information

D. Cheap

Page 7: Viruses, Biometrics, Encryption

2 disadvantages of Biometric Security

Expensive

Invasion of privacy

Page 8: Viruses, Biometrics, Encryption

How does Anti Virus Software combat Viruses? 陿蚟陿翿

Antivirus software (or anti-virus) is computer software used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.

Page 9: Viruses, Biometrics, Encryption

What type of information should be encrypted? 3 Examples

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).