Viruses, Biometrics, &  Encryption  By: Ashley Parker
Code Red Virus This virus will deface websites
Love Bug Virus  A new computer virus where the virus is transmitted through e-mail messages titled “I Love You, ”  which has ultimately damaged government and business computers in Asia, Europe and the United States.
Biometric Computer Security Instead of using passwords there are specific ways of identifying the user. This includes fingerprinting, retina, and voice recognition.
Phishing Scheme An example of a phishing scheme is when there is a message titled as “FREE VACATION TO THE CARRIBBEAN”  This requires personal and financial information to be entered and could potentially be stolen
Advantages of Biometric Security Access to secured facilities Access to classified information Access to computer and office systems
Disadvantages to Biometric Security Cost of implementing it Public concern over safety issues Could also lead to abuse in personal information
Anti-Virus Software Anti-virus software computer programs are programs that attempt to identify, neutralize, or eliminate malicious software.
Information that should be Encrypted  Social Security Number Credit Card information Insurance Information

More Related Content

PPT
Viruses, Biometrics And Encryption
PPT
Computer Infections
PDF
PHISHING PROTECTION
PPTX
Phishing
PPT
Mod7 Lab Kohne
PDF
Cyber security
PPT
Phishing attacks ppt
PPTX
Phishing and hacking
Viruses, Biometrics And Encryption
Computer Infections
PHISHING PROTECTION
Phishing
Mod7 Lab Kohne
Cyber security
Phishing attacks ppt
Phishing and hacking

What's hot (20)

PPTX
Phishing
PPT
Phishing & Pharming
ODP
Computer related risks presentation
ODP
Computer related risks presentation
PDF
How Hackers Can Use Your Data Against You + Tips to Protect Yourself
PPTX
Phishing
PPT
Viruses, Biometrics, Encryption
PPTX
PPTX
Phishing
PDF
04-1 E-commerce Security slides
PPT
P H I S H I N G
PDF
Phishing exposed
PPTX
Identity theft
PPTX
The Whys and Wherefores of Web Security – by United Security Providers
PPT
Intro phishing
PPTX
Phishing techniques
PPTX
What is Phishing and How can you Avoid it?
PPTX
Seminaar Report of Phishing VIII Sem
PPTX
Phishing
PPTX
Ransomware
Phishing
Phishing & Pharming
Computer related risks presentation
Computer related risks presentation
How Hackers Can Use Your Data Against You + Tips to Protect Yourself
Phishing
Viruses, Biometrics, Encryption
Phishing
04-1 E-commerce Security slides
P H I S H I N G
Phishing exposed
Identity theft
The Whys and Wherefores of Web Security – by United Security Providers
Intro phishing
Phishing techniques
What is Phishing and How can you Avoid it?
Seminaar Report of Phishing VIII Sem
Phishing
Ransomware
Ad

Viewers also liked (16)

PDF
4 rose screenhits
PDF
Wealth Apprentice Profile
PPTX
Hot Air Balloons
PDF
NewSchoolLeader.com First year Principal Hurdles
PPTX
1 sarah aa 24 may13
PPT
2 jenny women in angel investing
PPTX
Maria Dramalioti-Taylor's Rules for Entrenpreneurs
PPT
Pyramid Of Intervention
PPTX
SLLA EXAM Passed! Top 5 Interviewing Tips!
PPT
Electronic Communication 2a
PPT
Albert's paintings
PPT
CCD (Charge Coupled Device)
PPT
Prices
PPT
Pietro Stoneware-Fountains, Urns, Planters, and Statuary
PPT
Parts Of The Computer System
PPT
Virtual Reality
4 rose screenhits
Wealth Apprentice Profile
Hot Air Balloons
NewSchoolLeader.com First year Principal Hurdles
1 sarah aa 24 may13
2 jenny women in angel investing
Maria Dramalioti-Taylor's Rules for Entrenpreneurs
Pyramid Of Intervention
SLLA EXAM Passed! Top 5 Interviewing Tips!
Electronic Communication 2a
Albert's paintings
CCD (Charge Coupled Device)
Prices
Pietro Stoneware-Fountains, Urns, Planters, and Statuary
Parts Of The Computer System
Virtual Reality
Ad

Similar to Viruses, Biometrics, & Encryption (20)

PPT
Dilasha Shrestha Slideshow 3
PPT
Viruses, Biometrics, Encryption
PPT
Viruses, Biometrics, Encryption
PPT
Computer Viruses, Biometrics, And Encryption
PPT
Viruses, Biometrics, Encryption
PPT
Viruses, Biometrics, Encryption
PPTX
Code Red Virus
PPTX
Internet Search Slideshow, Section 1
PPTX
Viruses
PPTX
Viruses, Biometrics, Encryption
PPTX
Comslide 3
PPT
Security
PPT
Viruses, Biometrics, & Encryptions
PPT
Viruses, Biometrics, & Encryptions
PPT
System-Security-acit-Institute
PPT
Computer security
PPT
SecurityBasics.ppt
PDF
Computer Security Threats
PPT
Threats to an information system
PDF
ICT Security.pdf
Dilasha Shrestha Slideshow 3
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Computer Viruses, Biometrics, And Encryption
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Code Red Virus
Internet Search Slideshow, Section 1
Viruses
Viruses, Biometrics, Encryption
Comslide 3
Security
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
System-Security-acit-Institute
Computer security
SecurityBasics.ppt
Computer Security Threats
Threats to an information system
ICT Security.pdf

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
STKI Israel Market Study 2025 version august
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
A review of recent deep learning applications in wood surface defect identifi...
STKI Israel Market Study 2025 version august
Comparative analysis of machine learning models for fake news detection in so...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Microsoft Excel 365/2024 Beginner's training
UiPath Agentic Automation session 1: RPA to Agents
A contest of sentiment analysis: k-nearest neighbor versus neural network
Basics of Cloud Computing - Cloud Ecosystem
Consumable AI The What, Why & How for Small Teams.pdf
4 layer Arch & Reference Arch of IoT.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Getting started with AI Agents and Multi-Agent Systems
OpenACC and Open Hackathons Monthly Highlights July 2025
Final SEM Unit 1 for mit wpu at pune .pptx
sbt 2.0: go big (Scala Days 2025 edition)
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A proposed approach for plagiarism detection in Myanmar Unicode text
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Viruses, Biometrics, & Encryption

  • 1. Viruses, Biometrics, & Encryption By: Ashley Parker
  • 2. Code Red Virus This virus will deface websites
  • 3. Love Bug Virus A new computer virus where the virus is transmitted through e-mail messages titled “I Love You, ” which has ultimately damaged government and business computers in Asia, Europe and the United States.
  • 4. Biometric Computer Security Instead of using passwords there are specific ways of identifying the user. This includes fingerprinting, retina, and voice recognition.
  • 5. Phishing Scheme An example of a phishing scheme is when there is a message titled as “FREE VACATION TO THE CARRIBBEAN” This requires personal and financial information to be entered and could potentially be stolen
  • 6. Advantages of Biometric Security Access to secured facilities Access to classified information Access to computer and office systems
  • 7. Disadvantages to Biometric Security Cost of implementing it Public concern over safety issues Could also lead to abuse in personal information
  • 8. Anti-Virus Software Anti-virus software computer programs are programs that attempt to identify, neutralize, or eliminate malicious software.
  • 9. Information that should be Encrypted Social Security Number Credit Card information Insurance Information