Date post: | 13-Apr-2017 |
Category: |
Technology |
Upload: | waqar-akram |
View: | 6 times |
Download: | 0 times |
Tuesday, May 2, 2023 1
Tuesday, May 2, 2023 2
3
Presented to
Dr. Saad MesonPresented by
*Waqar Akram (17)Shezra Atta (07)
Mahnoor Shahid(109)Zeeshan Hameed(10)
Bscs(3rd Morning)
Time: 20 Mnts Slides = 28
Tuesday, May 2, 2023
Tuesday, May 2, 2023 4
TITLE PAGEPresentation ON
Facebook Protection through Finger Print and DNA Coding
5
FacebookIntroduced And PurposeIs It Safe?DrawbacksHackersHow To Prevent?Finger PrintsHow its Work?DNAIs it Programming Langusge?
Tuesday, May 2, 2023
Content
6
WHAT IS FACEBOOK?
Tuesday, May 2, 2023
7
launched on February 4, 2004. It was founded by Mark Zuckerberg with his college roommates and fellow Harvard University student Eduardo Savarin. Mark Zuckerberg created Facebook in his Harvard dorm room.
Tuesday, May 2, 2023
Tuesday, May 2, 2023 8
Purpose?
9
Overall, Facebook as a website is a pretty safe place. There is built-in security that helps to protect you and your information. One primary level of security that Facebook uses is called Secure Socket Layer (SSL).
With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
IS FACEBOOK SAFE?
Tuesday, May 2, 2023
10
Phishing is still the most
popular method of hacking
facebook.
Millions of Facebook users access
Facebook through their mobile phones. In case the hacker
can gain access to the victims mobile phone then he can probably gain access to his/her
Facebook account
Keylogging is the easiest way to hack
a Facebook password. Keylogging
sometimes can be so dangerous that even a person with good
knowledge of computers can fall
for it.
Almost 80% percent people use stored passwords in their
browser to access the Facebook. This is quite
convenient, but can sometimes be extremely dangerous. Stealer's are
software's specially designed to capture the saved passwords stored in the victims Internet
browser.
Drawbacks of
Facebook Security
Tuesday, May 2, 2023
Tuesday, May 2, 2023 11
Sometimes a hacker uses
the Facebook account to
spread viruses and
spam
Hackers may also use a person's Facebook account to ask their Facebook friends for
money
Hackers also may hack
into a person's Facebook
account for various reasons
WHO ARE HACKERS AND HOW DO THEY HACK?
Tuesday, May 2, 2023 12
The latest example of using many people's Facebook pages to spread viruses was the various pornographic and violent pictures that were found on Facebook in NovemberThis break of security caused many users to fear their vulnerability to more malicious attacks on the social networking giant in the future.
Some users deactivated their accounts after these attacks occurred.
Tuesday, May 2, 2023 13
“The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure”.
What is Biometrics..??
14
Biometrics through finger print.
Tuesday, May 2, 2023
Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics, and point-of-sale applications.
In addition to security, the driving force behind biometric verification has been convenience, as there are no passwords to remember or security
tokens to carry. eg.Measuring someone’s gait doesn’t even require a contact with the person.
Biometric verification becoming common..!!
Fingerprint recognition refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.
Biometrics through a Finger Print
Over all Biometrics Process
Scanning process In this step take the skectech of finger print
Processer process the skectech and convert into binary code
Storage Store this binary code in the database
Fingerprint processing….
Tuesday, May 2, 2023 19
How Does a Fingerprint Optical Scanner Work?
Tuesday, May 2, 2023 20
Fingerprint authentication
technology is no longer going to be reserved for
secret high clearance
government facilities – we
get to use fingerprint
clearance for accessing email,
logging into social networks like Facebook or
Twitter, and anything else
that requires a password.
Finger code BiometricDNA
Tuesday, May 2, 2023 21
Tuesday, May 2, 2023 22
DNA Diagram
DNA is not only a complex and self-contained programming language for life, but also a pattern representation system that efficiently stores massive amounts of information and provides built-in mechanisms for environmental adaptation.
From IT point of view the DNA is a virtual machine with its own machine code.
The memory addresses contain 2 bits 00,01,10,11 which are named A,G,T,C (A,G,U,C).
Each 3 memory address build a machine code instruction, named “codon”. This is 6 bits.
The number of possible instructions 64.
The program begins with an “AUG” (methionin) entry point, and there are 3 possible exit point. Just like a computer program. Instructions can create 20 amino acids.
IS DNA A PROGRAMMING LANGUAGE?
It has been used once to make a 4-ary arithmetic system, followed by a very simple computer (see MAYA-II) that excels at tic-tac-toe.
But it's not a programming language. It's not even actually an arithmetic system (although it can be used to symbolically create one).
It's not a program. It's more like a blueprint, where the positions of the codes represent where to stick amino acids together to form proteins. The proteins are molecular machines that perform single tasks.
Computers store data in two-valued bits, grouped as bytes of 7 or more bits (for ASCII). One byte holds 2^7=128 unique values.
DNA stores data in four-valued base pairs, which RNA then groups as codons of 3 pairs. One codon holds 4^3=2^6=64 unique values.
A sequence of base pairs that convey biological information is called a gene. DNA includes extra information to express or suppress specific genes. Each gene has at least one bit of information for expression or suppression.
Computer files may be measured in megabytes or gigabytes: millions or billions of bytes. One CD-ROM disc may store about 710 MB. Modern solid-state memory and disk drives can store gigabytes.
Tuesday, May 2, 2023 26
OUR IDEA
The thing I want to represent is that I want to prepare an application of finger print authentication so that our login should require our fingerprint for safety purpose on fb. The main and distinguish idea that I want to represent that I want to made a DNA coding detector sensor so that the owner of the appliance should already code its DNA coding sequence in its appliance. Whenever he or she want to login, the sensor should detect its DNA sequence code in order to avoid hacking and misuse of information. If the detected code matched with the user code, the computer will login automatically otherwise it will reject the provided code.
Tuesday, May 2, 2023 27
Any Question?
Tuesday, May 2, 2023 28