The networks, virus scanners, and hacking
If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.
Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.
And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".
That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.
But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.
One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.
That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.
Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.
Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.
The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.
So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.
I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.
If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.
Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.
And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".
That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.
But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.
One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.
That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.
Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.
Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.
The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.
So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.
I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.
Comments
Post a Comment