Skip to main content

Selecting a suitable security solution for the ICT sector.

Selecting a suitable security solution for the ICT sector.

When we are choosing a data security solution, the user-friendly and automatized solution might feel good. But the thing is that when we are choosing the solution, we must remember that all software and other maintenance operations are owned and made by somebody. And that thing is making the new kind of threats for security. The thing is that the spies, who might operate in the public or private sector, might want to cover the data, what they steal, that nobody else than people, who are willing to pay that data would use it.

If we think the case, that internet security company starts to attack against us, we might feel paranoid. But then we must realize, that we might know somebody, or in our social media or real-life social media network, the thing is that there might be somebody, who might want to target for attackers by using us as the gate.

This is one thing, what we must realize when we are selecting the ICT-security solution. And before we are starting to do anything, we must make analyze, what kind of threat we will face. That thing is helping us to select the service and programs, which are most suitable for us. Here I must say, that there are two ways to hack the system, one is the technological hacking, and another version is social hacking.

The best example of social hacking is that some good-looking girl comes to ask the passwords or something like that from the ICT-team. This person might be looking innocent, but the thing is that this individual would use the space of some company for installing stethoscopes, what are equipped with microphones to walls, and also put on the server for surveillance cameras to that office. Those actions can be made for surveillance or just spoiling the reputation of some company, and making difficulties for its business.

There are other ways to attack, and one is the hybrid attack, where the Email or some other message will cheat person to use some bandit WLAN station, and that makes possible to create "the man-in-middle" attack against some target. In this attack all data, what some computer sends and receives travels through another computer, what can copy single bit in that traffic. In that process, the attacker's computer can replace original data by using faked data, and this might be used in propaganda operations.

This is a very effective way to observe the use of network-based data. And this is the thing, what the most of computer usage today is. We are using a computer or data networks every time, and if somebody would hack that transmitting, our privacy might be gone.

Whenever we are using mobile systems like cell-phones, we are using mobile networks, which are similar to WLAN networks, but their range is greater. If somebody can hack that system, the privacy is gone, but also mobile payments and other kinds of things are uncovering things, what we might not want to tell other people. But even if we think, that there is nothing to hide in our own lives, in our social life would contain people, who might be good targets for professional hackers.

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of