SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Viruses

Joe Faustyn
  Period 4
Code Red Virus
• The worm virus defaced up to 359,000 web
  sites
“Love bug” virus
• A virus that had an attachment that when
  opened would be sent to everyone in your
  address book and made changes to the user’s
  system
Biometric Computer Security
• Makes users use a finger print or eye scan
  instead of a password to gain access
Phishing Scheme
• Phishing is a way to trick people into giving
  them your password by making them think
  that they are on a trusted site.
Biometric Security
1. It allows only you to access your account
2. There is no code to crack and it is impossible
   to forge
3. Makes password security no longer a
   problem
Biometric Security
1. Only one person can access the account even
   if it is shared
2. Cuts on the finger may cause you to not gain
   access until healed
3. Can be very picky and take a while to grant
   access
Anti Virus Software combat Viruses
• Anti-virus software commonly finds viruses in
  bad emails and websites. It fights these
  viruses by identifying them and destroying
  them
Types of Encrypted Information
1. Social Security Number
2. Address
3. Phone number

Weitere ähnliche Inhalte

Was ist angesagt?

Jensen
JensenJensen
Jensenmorag
 
Anthony
AnthonyAnthony
Anthonymorag
 
Marleah
MarleahMarleah
Marleahmorag
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryptionsmithj12
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Rick
RickRick
Rickmorag
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With PacketsSteveBrownNI
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdfArise Roby
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Mediatechexpert2345
 
Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewallMobiwol
 

Was ist angesagt? (19)

Jensen
JensenJensen
Jensen
 
Anthony
AnthonyAnthony
Anthony
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Phishing
PhishingPhishing
Phishing
 
Marleah
MarleahMarleah
Marleah
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
Internet security
Internet securityInternet security
Internet security
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Rick
RickRick
Rick
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
Importance of android firewall
Importance of android firewallImportance of android firewall
Importance of android firewall
 

Andere mochten auch

Webinar: Online marketing update
Webinar: Online marketing updateWebinar: Online marketing update
Webinar: Online marketing updateLECTRIC
 
Projeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e BrunoProjeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e Brunomhfribeiro
 
Licking the PAR Problem
Licking the PAR ProblemLicking the PAR Problem
Licking the PAR ProblemMABSIV
 
[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yenenglishonecfl
 
Variados usos de la palabra "pico"
Variados usos de la palabra "pico"Variados usos de la palabra "pico"
Variados usos de la palabra "pico"BARRATA
 
festival de nieve
festival de nievefestival de nieve
festival de nievepatricia72
 
Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006ranganatha2
 
From Best Practices to Next Practices in Microfinance
From Best Practices to  Next Practices in MicrofinanceFrom Best Practices to  Next Practices in Microfinance
From Best Practices to Next Practices in MicrofinanceMABSIV
 
D02L01 M Damnjanovic
D02L01 M DamnjanovicD02L01 M Damnjanovic
D02L01 M DamnjanovicSEENET-MTP
 
Recruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using DigitalRecruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using DigitalBrian Barela
 
De qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprenderDe qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprenderAndrés Romero
 
Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!Usanov Aleksey
 
Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...MABSIV
 
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with FluxesA. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with FluxesSEENET-MTP
 
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)SEENET-MTP
 
He l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friendsHe l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friendsEsen Sandıraz
 

Andere mochten auch (20)

Webinar: Online marketing update
Webinar: Online marketing updateWebinar: Online marketing update
Webinar: Online marketing update
 
Projeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e BrunoProjeto de Aplicação - Marcos e Bruno
Projeto de Aplicação - Marcos e Bruno
 
Licking the PAR Problem
Licking the PAR ProblemLicking the PAR Problem
Licking the PAR Problem
 
[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen[2] Concurrent 1 Dinh Hai Yen
[2] Concurrent 1 Dinh Hai Yen
 
Variados usos de la palabra "pico"
Variados usos de la palabra "pico"Variados usos de la palabra "pico"
Variados usos de la palabra "pico"
 
festival de nieve
festival de nievefestival de nieve
festival de nieve
 
Obradoiro comic
Obradoiro comicObradoiro comic
Obradoiro comic
 
kidou20150403
kidou20150403kidou20150403
kidou20150403
 
Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006Evaluacion Subjetiva Biblioteca TSJA - 2006
Evaluacion Subjetiva Biblioteca TSJA - 2006
 
From Best Practices to Next Practices in Microfinance
From Best Practices to  Next Practices in MicrofinanceFrom Best Practices to  Next Practices in Microfinance
From Best Practices to Next Practices in Microfinance
 
D02L01 M Damnjanovic
D02L01 M DamnjanovicD02L01 M Damnjanovic
D02L01 M Damnjanovic
 
Recruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using DigitalRecruiting for Winter Conference Using Digital
Recruiting for Winter Conference Using Digital
 
De qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprenderDe qué hablo cuando hablo de emprender
De qué hablo cuando hablo de emprender
 
Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!Телевизионная региональная реклама: быть или не быть?!
Телевизионная региональная реклама: быть или не быть?!
 
Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...Industry association of rural banks: strategic partner for developing access ...
Industry association of rural banks: strategic partner for developing access ...
 
Timetable
TimetableTimetable
Timetable
 
Jiji
JijiJiji
Jiji
 
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with FluxesA. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
A. Micu - Tests of Heterotic – F-Theory Duality with Fluxes
 
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
Ludmil Hadjiivanov - Symmetries in Quantum Field Theory (2)
 
He l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friendsHe l lo!_we_are_the__best_friends
He l lo!_we_are_the__best_friends
 

Ähnlich wie Viruses

Computer Infections
Computer InfectionsComputer Infections
Computer Infectionserowell
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionlockyerj
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9robsworld
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 

Ähnlich wie Viruses (20)

Computer security
Computer securityComputer security
Computer security
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Online reputation
Online reputationOnline reputation
Online reputation
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 

Mehr von faustynj

Web Browsers
Web BrowsersWeb Browsers
Web Browsersfaustynj
 
Search Engines
Search EnginesSearch Engines
Search Enginesfaustynj
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communicationsfaustynj
 
Outside The Computer
Outside The ComputerOutside The Computer
Outside The Computerfaustynj
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computersfaustynj
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computerfaustynj
 

Mehr von faustynj (7)

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Arpanet
ArpanetArpanet
Arpanet
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
 
Outside The Computer
Outside The ComputerOutside The Computer
Outside The Computer
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computers
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Viruses

  • 2. Code Red Virus • The worm virus defaced up to 359,000 web sites
  • 3. “Love bug” virus • A virus that had an attachment that when opened would be sent to everyone in your address book and made changes to the user’s system
  • 4. Biometric Computer Security • Makes users use a finger print or eye scan instead of a password to gain access
  • 5. Phishing Scheme • Phishing is a way to trick people into giving them your password by making them think that they are on a trusted site.
  • 6. Biometric Security 1. It allows only you to access your account 2. There is no code to crack and it is impossible to forge 3. Makes password security no longer a problem
  • 7. Biometric Security 1. Only one person can access the account even if it is shared 2. Cuts on the finger may cause you to not gain access until healed 3. Can be very picky and take a while to grant access
  • 8. Anti Virus Software combat Viruses • Anti-virus software commonly finds viruses in bad emails and websites. It fights these viruses by identifying them and destroying them
  • 9. Types of Encrypted Information 1. Social Security Number 2. Address 3. Phone number