Skip to main content

Selecting a suitable security solution for the ICT sector.

Selecting a suitable security solution for the ICT sector.

When we are choosing a data security solution, the user-friendly and automatized solution might feel good. But the thing is that when we are choosing the solution, we must remember that all software and other maintenance operations are owned and made by somebody. And that thing is making the new kind of threats for security. The thing is that the spies, who might operate in the public or private sector, might want to cover the data, what they steal, that nobody else than people, who are willing to pay that data would use it.

If we think the case, that internet security company starts to attack against us, we might feel paranoid. But then we must realize, that we might know somebody, or in our social media or real-life social media network, the thing is that there might be somebody, who might want to target for attackers by using us as the gate.

This is one thing, what we must realize when we are selecting the ICT-security solution. And before we are starting to do anything, we must make analyze, what kind of threat we will face. That thing is helping us to select the service and programs, which are most suitable for us. Here I must say, that there are two ways to hack the system, one is the technological hacking, and another version is social hacking.

The best example of social hacking is that some good-looking girl comes to ask the passwords or something like that from the ICT-team. This person might be looking innocent, but the thing is that this individual would use the space of some company for installing stethoscopes, what are equipped with microphones to walls, and also put on the server for surveillance cameras to that office. Those actions can be made for surveillance or just spoiling the reputation of some company, and making difficulties for its business.

There are other ways to attack, and one is the hybrid attack, where the Email or some other message will cheat person to use some bandit WLAN station, and that makes possible to create "the man-in-middle" attack against some target. In this attack all data, what some computer sends and receives travels through another computer, what can copy single bit in that traffic. In that process, the attacker's computer can replace original data by using faked data, and this might be used in propaganda operations.

This is a very effective way to observe the use of network-based data. And this is the thing, what the most of computer usage today is. We are using a computer or data networks every time, and if somebody would hack that transmitting, our privacy might be gone.

Whenever we are using mobile systems like cell-phones, we are using mobile networks, which are similar to WLAN networks, but their range is greater. If somebody can hack that system, the privacy is gone, but also mobile payments and other kinds of things are uncovering things, what we might not want to tell other people. But even if we think, that there is nothing to hide in our own lives, in our social life would contain people, who might be good targets for professional hackers.

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...