Skip to main content

The use of AI requires data security.

 The use of AI requires data security.



In the beginning, I must say that modern malicious software is searching data. It opens back gates to the system. And then that sends data to the third party. Another thing is that in most security scenarios the destructive viruses are used to open roads to the data breakers. Those people can try to slip non-secured components into the system. 

This component can send the entire data to the attacker's system. It is not the same does the computer virus infects the server or the workstation. If the computer shuts down sometimes. That clears the virus from the RAM. Servers are vulnerable because if RAM-virus infects them it would not be removed from RAM-memory until the next boot. Servers are also involving most of the data. 

That is stored in the system. So that means if the spy tool is infecting the server. That requires that the operators must change passwords and other access keys to the system. Computer viruses are always advancing and hackers are always finding new weak points of the system. They might take things like routers of the system to target. And double the entire data flow of the system. Then they can route the other data flow to their servers. 

If we are thinking of the form of the AI. That is "only" a database where is stored the solutions for a certain type of problem. Or actually, those databases involve information that the system uses to respond to a certain type of data. The data that travels in the system activates a certain database. And then the AI can solve problems. 

Machine learning means that the computer can automatically grow the data mass. And make connections between databases. The automatically learning machines can also call "open systems". The "closed" or "fixed systems" require that the operators are involving the solution. And the fixed system doesn't grow the data mass or connections between databases without operators. 

Anyway, without those databases the AI is helpless. If the computer viruses hit those databases. The system would turn useless. This means that also the AI requires virus scanners against data viruses. The data viruses are normally detected when they attempt to write themselves to hard disks. 

But there are also RAM viruses that are remaining in RAM. Those viruses are hard to detect. The virus doesn't write its code to hard disks. So the virus scanners are not able to see that thing. 

This is why they are called Stealth-viruses. But also the regular computer viruses require to download their code to the RAM-memory of the computer. Regular computer viruses are normally acting always the same way. They are involving virus code. 

The virus writers normally pack that malicious code in the form of EXE or COM-file that is only renamed for looking like an innocent file. 

The next type of virus is easy to deny. The write protection of Autoexec was enough. And the new operating systems didn't include that file. so making this kind of virus was suitable only in Windows 9X.

Then the program that is some kind of macro as an example the BAT file just replaces the last line in the "Autoexec.Bat"  by the command line that renames the virus file ("virus" to Virus.exe). Replacement of autoexec.bat happened by simply deleting Autoexec and replacing it with the macro that is renamed to Autoexec.Bat. And then it will activate the virus at the next boot session. Or sometimes there was only a command what deletes the system files. 

Modern virus scanners are scanning also the code what the files involved. And if there is some kind of virus code. The firewall and anti-virus program sends the information of that virus to the network control. And that might close even the internet connection of the systems. Also denying the echoing commands and auto-driving programs can protect computers against viruses. 

But computer viruses still exist. Modern malicious code is meant to steal information. They are more complicated than some viruses of the '90s. Those new viruses are also destroying only things like databases. And they can cause more damages than some virus that destroys the entire data system. If only the databases are destroyed. And the system is not used very often. That thing can cause a "nasty surprise" for people who should use the system. 


https://nexthop.ca/it-news/common-types-of-computer-viruses/


https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://en.wikipedia.org/wiki/AUTOEXEC.BAT


https://en.wikipedia.org/wiki/Computer_virus


Image: https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/



Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of