Information security and trojan horses
Normally we are thinking trojan horses as the malicious software, what is slipped to the system, and what is transforming from some shareware program to a computer virus or spying tool. But there is another way to think about the trojan horse, and that thing is connected with the idea of the virtual working environment.
That idea is that the entire virtual headquarters of the company can turn to trojan horse very easy way. When the system architects are building the internet or IP-base solution, where the team can work virtually, that thing causes one very interesting problem, when we are thinking it in the point of view of the cybersecurity. What if the entire company would cheat to use the similar digital headquarters, what is maintained by criminals?
The idea is that if we would use the virtual headquarters, and we offer the service from some company, somebody can build a duplicate of that service or working environment. After that, the hostile operator just cheats the crew of the company for using that giant trojan horse, and the thing of how cheating can happen is quite easy. The people, who would install IP-addresses and Internet addresses to the system would simply get wrong net-addresses, or the link, what is sent to the customer can be faked.
That would cause that entire corporation would turn to use hostile virtual solution, and make every action under the surveillance of the hostile operator. This kind of things can cause the worst kind of data leak as possible. And when we are thinking about the informative trojan horses, what can be used to send the faked information about the advantage of the economic situation of some companies, the thing can be done by NAT: ing the homepages.
This means that the router would automatically turn the IP-address to another, and this technology is created for denying the loss of IP-addresses. But if the natting parameters are wrong, the system can turn dangerous. The thing is that the router can link faked homepages, like as an example the faked homepages of stock markets, and that thing could make possible that the investors would get false information of the advantages of the value of shares.
But that kind of techniques, what are called as phishing can use to get access codes and other things from the law enforcement and other operators, what should be trusted. And if some unauthorized user would see the wrong databases, that thing can cause very bad troubles for many people.
Normally we are thinking trojan horses as the malicious software, what is slipped to the system, and what is transforming from some shareware program to a computer virus or spying tool. But there is another way to think about the trojan horse, and that thing is connected with the idea of the virtual working environment.
That idea is that the entire virtual headquarters of the company can turn to trojan horse very easy way. When the system architects are building the internet or IP-base solution, where the team can work virtually, that thing causes one very interesting problem, when we are thinking it in the point of view of the cybersecurity. What if the entire company would cheat to use the similar digital headquarters, what is maintained by criminals?
The idea is that if we would use the virtual headquarters, and we offer the service from some company, somebody can build a duplicate of that service or working environment. After that, the hostile operator just cheats the crew of the company for using that giant trojan horse, and the thing of how cheating can happen is quite easy. The people, who would install IP-addresses and Internet addresses to the system would simply get wrong net-addresses, or the link, what is sent to the customer can be faked.
That would cause that entire corporation would turn to use hostile virtual solution, and make every action under the surveillance of the hostile operator. This kind of things can cause the worst kind of data leak as possible. And when we are thinking about the informative trojan horses, what can be used to send the faked information about the advantage of the economic situation of some companies, the thing can be done by NAT: ing the homepages.
This means that the router would automatically turn the IP-address to another, and this technology is created for denying the loss of IP-addresses. But if the natting parameters are wrong, the system can turn dangerous. The thing is that the router can link faked homepages, like as an example the faked homepages of stock markets, and that thing could make possible that the investors would get false information of the advantages of the value of shares.
But that kind of techniques, what are called as phishing can use to get access codes and other things from the law enforcement and other operators, what should be trusted. And if some unauthorized user would see the wrong databases, that thing can cause very bad troubles for many people.
Comments
Post a Comment