Viruses, Biometrics, & Encryptions

9
By Tori Small

Transcript of Viruses, Biometrics, & Encryptions

Page 1: Viruses, Biometrics, & Encryptions

By Tori Small

Page 2: Viruses, Biometrics, & Encryptions

The Code Red worm or Virus was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. They also gave the worm the phrase "Hacked By Chinese!"with which the worm defaced websites. Even though the worm was released on July 13, the largest group of infected computers was seen on July 19, 2001. By that time, the number of infected hosts reached 359,000

Page 3: Viruses, Biometrics, & Encryptions

This virus traveled via e-mail messages entitled "I Love You," crippling government and business computers in Asia, Europe, and the United States. No immediate cure was known as experts were shocked by the speed and wide reach of the virus. A worm is a special type of virus designed to spread from one computer to another over any type of network. Its job has been simplified by the Internet and e-mail, which allow the worm to strike countless computer systems in seconds.

Page 4: Viruses, Biometrics, & Encryptions

a biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Because fingerprints offer an additional factor of authentication, i.e., something you are, in addition to something that you know (password), or have (token), biometric security systems offer significant improvements over traditional computer security.

Three Examples are: Fingerprints Eye scan Voice Recognition

Page 5: Viruses, Biometrics, & Encryptions

The first known direct attempt against a payment system affected E-gold in June 2001, which was followed by a "post-9/11 id check" shortly after the September 11 attacks on the World Trade Center. Both were viewed at the time as failures, but can now be seen as early experiments towards more fruitful attacks against banks.

Page 6: Viruses, Biometrics, & Encryptions

Information is more difficult to steal Systems may be less expensive than

other high-tech security systems Eliminates problems caused by lost

ids or forgotten passwords.

Page 7: Viruses, Biometrics, & Encryptions

It is found that with age the voice of a person differs. Also if they are sick or if the environment is too noisy then they may not authenticate correctly

For people affected with diabetes, their eyes are affected which results in differences with each scan

Biometrics can be expensive

Page 8: Viruses, Biometrics, & Encryptions

Signature based detection To identify viruses and other

malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in pre-existing files, the entire file is searched, not just as a whole, but also in pieces.

Page 9: Viruses, Biometrics, & Encryptions

Credit cards Personal address and other similar

information Your social security number