Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
(3 11 09)Viruses, Biometrics, Encryption
1. Code Red worm was a
The
computer worm observed on
the Internet on July 13, 2001. It
attacked computers running
Microsoft’s IIS web server.
2. ILOVEYOU was a computer virus that hit
numerous computers in 2000, when it
was sent as an attachment to an email
message with the text quot;ILOVEYOUquot; in the
subject line.
Upon opening the attachment, the virus
sent a copy of itself to everyone in the
user's address list, posing as the user. It
also made a number of malicious
changes to the user's system.
3. Biometric computer security
systems tie a unique physical
attribute of a user to the IT
resources and data that they are
allowed to access.
Ex: fingerprint, voice activation, or
eye identification
4. Scheme is a
Phishing
fake site used to
convince you to insert
your personal and
financial information so
they can steal it.
5. 3 advantages of Biometric Security
include people cannot steal your
identity without you being present, it’s
harder to steal identities, and you will be
the only one able to access whatever
technology has biometric security.
6. 3 Biometric Security disadvantages
include: your children won’t be able to
access the computer without you, if you
feel sick the voice security might not pick
you up, or if you break the security
device then you will never be able to
get the information off the computer.
8. that should be
Information
encrypted is personal,
financial, and any other
information that could help
someone steal your identity.
Ex: bank site, email, or
chatting sites