SlideShare una empresa de Scribd logo
1 de 8
Dilasha Shrestha 4 th  BLOCK slideshow # 3 Code Red is a worm that exploits a vulnerability in one of the add-in components that is installed by default in Microsoft's web server Code  red  virus
Love Bug Virus ,[object Object]
Biometric Computer Security ,[object Object],[object Object]
Phishing Scheme ,[object Object]
Biometric security advantages ,[object Object],[object Object],[object Object]
3 disadvantages of biometric system ,[object Object],[object Object],[object Object]
Antivirus combats virus ,[object Object]
Types of info encrypted ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
Rishu Mehra
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
Lacoon Mobile Security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
Patty Ramsey
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 

La actualidad más candente (18)

Web Filters
Web FiltersWeb Filters
Web Filters
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Content filters presentation
Content filters presentationContent filters presentation
Content filters presentation
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradox
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Digital Security
Digital Security Digital Security
Digital Security
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 

Destacado

Leyes de newton
Leyes de newtonLeyes de newton
Leyes de newton
betitita
 
Inside of a computer
Inside of a computerInside of a computer
Inside of a computer
klavender
 
Financial Technologies
Financial TechnologiesFinancial Technologies
Financial Technologies
sovid gupta
 
Parts of a Computer System
Parts of a Computer SystemParts of a Computer System
Parts of a Computer System
klavender
 

Destacado (16)

Leyes de newton
Leyes de newtonLeyes de newton
Leyes de newton
 
Copyright
CopyrightCopyright
Copyright
 
Spi & involving change management
Spi & involving change managementSpi & involving change management
Spi & involving change management
 
OOAD Chapter 1
OOAD Chapter 1OOAD Chapter 1
OOAD Chapter 1
 
Test
TestTest
Test
 
20091023 Tiscali Aziende Brochure
20091023 Tiscali Aziende Brochure20091023 Tiscali Aziende Brochure
20091023 Tiscali Aziende Brochure
 
OOAD Chap 2 System Choice
OOAD Chap 2 System ChoiceOOAD Chap 2 System Choice
OOAD Chap 2 System Choice
 
Inside of a computer
Inside of a computerInside of a computer
Inside of a computer
 
Buy Havells India Target 280 Fairwealth Securities
Buy Havells India Target 280 Fairwealth SecuritiesBuy Havells India Target 280 Fairwealth Securities
Buy Havells India Target 280 Fairwealth Securities
 
Innovazione Finanziaria in Cina - update 2006
Innovazione Finanziaria in Cina - update 2006Innovazione Finanziaria in Cina - update 2006
Innovazione Finanziaria in Cina - update 2006
 
Financial Technologies
Financial TechnologiesFinancial Technologies
Financial Technologies
 
Google
GoogleGoogle
Google
 
Social media e fashion 2011
Social media e fashion 2011Social media e fashion 2011
Social media e fashion 2011
 
Parts of a Computer System
Parts of a Computer SystemParts of a Computer System
Parts of a Computer System
 
Safegard Overview
Safegard OverviewSafegard Overview
Safegard Overview
 
Lucretia Italian Luxury Lingerie
Lucretia Italian Luxury LingerieLucretia Italian Luxury Lingerie
Lucretia Italian Luxury Lingerie
 

Similar a Dilasha Shrestha Slideshow 3

Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
monroel
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 

Similar a Dilasha Shrestha Slideshow 3 (20)

Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Cyber security
Cyber securityCyber security
Cyber security
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Three types of Authentications
Three types of AuthenticationsThree types of Authentications
Three types of Authentications
 

Dilasha Shrestha Slideshow 3

  • 1. Dilasha Shrestha 4 th BLOCK slideshow # 3 Code Red is a worm that exploits a vulnerability in one of the add-in components that is installed by default in Microsoft's web server Code red virus
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.