9
BRIAN YOUNG BLOCK 4 MARCH 6 Viruses, Biometrics, Encryption

Viruses, Biometrics, Encryption

Embed Size (px)

Citation preview

Page 1: Viruses,  Biometrics,  Encryption

BRIAN YOUNGBLOCK 4MARCH 6

Viruses, Biometrics, Encryption

Page 2: Viruses,  Biometrics,  Encryption

Code Red Virus

The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security.

Page 3: Viruses,  Biometrics,  Encryption

“Love Bug” Virus

ILOVEYOU was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs".

Page 4: Viruses,  Biometrics,  Encryption

Biometric Computer Security

TO identify some one by their unique characteristics.

Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, hand and palm geometry and iris recognition, which has largely replaced retina.

Behavioral are related to the behavior of a person. Examples include, but are not limited to signature verification, typing rhythm, gait recognition, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.

Page 5: Viruses,  Biometrics,  Encryption

Phishing Scheme

the Internal Revenue Service, have been used to glean sensitive data from U.S. taxpayers.] While the first such examples were sent indiscriminately in the expectation that some would be received by customers of a given bank or service, recent research has shown that phishers may in principle be able to determine which banks potential victims use, and target bogus e-mails accordingly.[

Page 6: Viruses,  Biometrics,  Encryption

3 advantages of Biometric

Biometrics cant be cracked and aren't easily accessed

They give quick easy access to those who are allowed access

They rarely fail or have errors

Page 7: Viruses,  Biometrics,  Encryption

3 disadvantages of Biometric

Even though they aren't easy to crack they are still able to work your way around them

They are expensiveTo allow people to be allowed by them you

have to process them

Page 8: Viruses,  Biometrics,  Encryption

How does Anti Virus Software combat Viruses

4 Identification methods Signature based detection Suspicious behavior monitoring Heuristics Generic Signatures

Page 9: Viruses,  Biometrics,  Encryption

What type of information should be encrypted

All bank account informationInformation pertaining where you liveInformation about your family and friend that

is confidential