9

Computer Infections

  • Upload
    erowell

  • View
    202

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Computer Infections
Page 2: Computer Infections

Code Red Virus

The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine

Page 3: Computer Infections

The “Love Bug” Virus

The Love Bug was a computer virus that hit numerous computers in 2000, when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. Most of the "damage" was the labor of getting rid of the virus. The Pentagon, CIA, and the British Parliament had to shut down their e-mail systems to get rid of the virus, as did most large corporations.

Page 4: Computer Infections

Biometric Computer Security

Biometrics are methods for uniquely recognizing humans based upon one or more physical or behavioral traits. In information technology particularly, biometrics is a form of identity access management and access control.

Three examples include:-Fingerprint-Voice-Iris

Page 5: Computer Infections

Phishing Scheme

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

In late 2006 a computer worm took over pages on MySpace and altered links to direct surfers to websites designed to steal login details.

Page 6: Computer Infections

Advantages of Biometric Security

-Increase security - Provide a convenient and low-cost additional tier of security.

- Reduce fraud by employing hard-to-forge technologies and materials.

*-Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes.

Page 7: Computer Infections

Disadvantages of Biometric Security

-It is found that with age, the voice of a person differs

-For people affected with diabetes, the eyes get affected resulting in differences.  -Biometrics is an expensive security solution.

Page 8: Computer Infections

Anti Virus Software

Antivirus software is computer software used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware.

Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures.

Page 9: Computer Infections

What kinds of information should be Encrypted?

-Credit card numbers-Passwords-Phone numbers-Social security numbers-Medical Records