Skip to main content

Networks and security of data storage

Networks and security of data storage

Networks are providing many benefits to handle data comparing to traditional methods like USB-sticks. The biggest benefit is that when data is stored in the cloud, that means it is independent of the platform, where it is handled. So in this kind of cases, we must remember, how many USB-sticks we have stolen, and how many times the computer, where the data is stored has damaged?

This is the reason, why the cloud is a really good place for processing data, and that is the thing why companies are investing in those technologies. The computers and other devices, which are used to handle data can be equipped with biometric keys, which gives access to precise data, what is stored in hard disks. When we are making those biometric identifiers we should make them easy to use, like the image, what is taken from the finger. Or rather the things, what are used automatically.

That means that the user of the system might not even know about the biometric identifier. If we think the keys, what are used to log in the computers, they might be things like mobile telephones. If we will make mobile telephone safe key, we might make a system, what has two modes. If the person just opens the mobile telephone, that thing would act like a normal cell phone. But when a person wants to use it as an electronic key, that might need to boot it, and during the startup, the person might need to give the biometric identifier. That would activate the role as the key.

And in a perfect system, the renew of this action should be done often enough, that the system would be safe. That means the cell phone can use by everybody, but only one person might use it as key to the system. And of course, if a person is under threat the snapping secret SOS over the biometric identifier might tell that person is in trouble. If the wrong person uses a telephone, the information of that would send to security personnel, and they might locate the phone very easily.

The thing is that biometric systems are easy to use, and they can collect many types of data. One thing is that the precise information about the areas, what biometric system uses for recognize person might not be mentioned. So the thing is that the mobile telephones, which are used to send the log-in request might have hidden biometric key, what detects if the wrong person tries to use the system. In some cases, the web-camera, what is used for face recognition might use the image of eyes for recognizing the user, and that thing might not be told to the users.

Or the mobile telephone, what is used to recognize the users, is connected to face or retina recognizer, what might be the normal web camera, and that system detects are the person, who attempts to log in the system, and user of the mobile telephone the same. In this case, there are two keys, which are comparing together. So in those cases, the maker of data security protocols has noticed, that some person can lose the mobile telephones.

In the real-life, there is another thing, what the maker of the log-in protocol must realize, is that there is a possibility, that somebody might be forced to let people access to the system. This means that in those cases there must be something to give for those people. The thing is that the system might have a backup protocol for the cases, where somebody is asked log-in for computers, which are used by some other people, and that thing might cause grey hair for the spies.

The thing is that if a person uses only passwords or tries to log in otherwise wring way, that system can lead the person to wring network segment. That network segment might contain information, what is equipped with a tracking cookie. And the mission of this system is to uncover the hackers, who might attempt to steal data.

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of