Sunteți pe pagina 1din 16

Computer Security

By: Guy Feldman, Max Feinberg, Daniel Pekkerman, Daniel


Shooshan
Table of Contents
● What is Computer Security
● News Story
● Worrying Statistics
● What is biometric security
● Biometrics in movies
● Biometric Security
● What is anti-virus
● Where to get anti-virus software
● MyDoom Virus
● Firewall Basics
● How to Set Up a Firewall
● Hacking Statistics
What is Computer Security?
● Computer Security is defined as protecting computer systems.
● It’s also known as Cybersecurity or Information technology security.
● There are 3 types of computer security: Physical security, Network security, and
executable security.
Russian bots rigged Voice Kids TV talent show
● There were complaints on May 16th, after Mikaella Abramova, won
56.5% of the phone in vote.
● The reason for controversy is because Abramova, the 10 year old singer,
is the daughter of wealthy businessman Yan Abramov.
● It turns out a cyber security firm was hired by Mikaella’s dad to rig the
vote in Mikaella’s favor
● The state owned channel vowed to make sure that this was the first and
last time that anyone would try to control the audience.
Restrictions To Improve Computer Security
I don’t think any restrictions can be made to improve
computer security because we can’t stop anyone from
doing whatever they want on their computer. But I think
there should be stricter laws in place so that hackers
should get more years in prison because digital theft is
just as bad or even worse than actual theft.
Biometric Authentication
● Biometric authentication is a security process that relies on the unique biological
characteristics of an individual to verify that they are apart of the system

● Biometric authentication systems will compare a biometric data capture to stored. If both
samples of the biometric data match, authentication is confirmed.

● The future of accessibility


Biometric Security In The Incredibles

https://www.youtube.com/watch?v=239jmYOhF9c

Even in the movie, “The Incredibles” made in 2004,


biosecurity was used to authenticate Edna’s profile.
Statistics Biometric Security
What is anti-virus?

● Anti-virus software or Anti malware software is a


program used to detect, prevent and remove many
different kinds of electronic threats.
● Modern Anti-virus softwares evolved to protect you
from more than just viruses and can keep you safe
from things like Trojan horses, worms, browser
hijackers and browser helper objects (BHO’s).
Where can I get Anti-virus software?
● There is an abundance of online and downloadable antivirus softwares all
over the internet available for purchase.
● There are many companies that offer Antivirus protection but the most
popular ones are McAfee, Total AV and Kaspersky. This is because they are
very reliable and never fail to do their job.
● Antiviruses come in many different prices depending on how many devices
you chose to protect and how many threats you would like protection
from, the length of the protection may also be a factor.
“My Doom” virus destroys people's
computers
● In 2004 a worm virus named “My Doom” was released into the interwebs
and spread extremely quickly.
● This virus usually spread and infected electronics through mail, text
messages and E-mails.
● The virus used infected computers to send out even more virus ridden
emails to other devices to spread faster.
● In 2004, 16%-25% of all emails sent that year were infected with the “My
Doom” worm virus.
● In total this virus caused over 38 billion dollars in electronic damages.
Firewall Basics

● A firewall monitors network traffic


● Decides on whether to block some traffic based on predetermined rules
● It can come as software, hardware, or both
● Firewalls range in price from $50 - $500
● There are different types of firewalls;
○ Proxy Firewall
○ Stateful Inspection Firewall
○ Unified Threat Management Firewall
○ Next-Generation Firewall
Setting Up a Firewall
These are steps to set up a firewall on Windows 7

● Go to the control panel and click System and Security


● Under Windows Firewall click Check Firewall Status and turn on the firewall
● Configure the settings for your networks
Statistics
Bibliography
DP:
https://searchsecurity.techtarget.com/definition/biometric-authentication
GF:
http://www.windowstalk.org/3-types-of-computer-security/
https://www.bbc.com/news/world-europe-48293196?intlink_from_url=https://www.bbc.com/news/topics/c
z4pr2gd85qt/cyber-security&link_location=live-reporting-story
MF: https://en.wikipedia.org/wiki/Antivirus_software
https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html
DS:
https://www.darkreading.com/attacks-breaches/data-breaches-exposed-42-billion-records-in-2016/d/d-id/
1327976
https://www.cbronline.com/news/global-data-breaches-2018
https://www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-record-in-2016-as-dnc-wendy-s
-co-hacked
https://blink.ucsd.edu/technology/security/user-guides/firewall/windows7.html
https://blink.ucsd.edu/technology/security/user-guides/firewall/windows7.html
The End - Video Time

S-ar putea să vă placă și