viruses, biometrics, encryption
TRANSCRIPT
BRIAN YOUNGBLOCK 4MARCH 6
Viruses, Biometrics, Encryption
Code Red Virus
The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security.
“Love Bug” Virus
ILOVEYOU was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs".
Biometric Computer Security
TO identify some one by their unique characteristics.
Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, hand and palm geometry and iris recognition, which has largely replaced retina.
Behavioral are related to the behavior of a person. Examples include, but are not limited to signature verification, typing rhythm, gait recognition, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.
Phishing Scheme
the Internal Revenue Service, have been used to glean sensitive data from U.S. taxpayers.] While the first such examples were sent indiscriminately in the expectation that some would be received by customers of a given bank or service, recent research has shown that phishers may in principle be able to determine which banks potential victims use, and target bogus e-mails accordingly.[
3 advantages of Biometric
Biometrics cant be cracked and aren't easily accessed
They give quick easy access to those who are allowed access
They rarely fail or have errors
3 disadvantages of Biometric
Even though they aren't easy to crack they are still able to work your way around them
They are expensiveTo allow people to be allowed by them you
have to process them
How does Anti Virus Software combat Viruses
4 Identification methods Signature based detection Suspicious behavior monitoring Heuristics Generic Signatures
What type of information should be encrypted
All bank account informationInformation pertaining where you liveInformation about your family and friend that
is confidential