Skip to main content

The use of AI requires data security.

 The use of AI requires data security.



In the beginning, I must say that modern malicious software is searching data. It opens back gates to the system. And then that sends data to the third party. Another thing is that in most security scenarios the destructive viruses are used to open roads to the data breakers. Those people can try to slip non-secured components into the system. 

This component can send the entire data to the attacker's system. It is not the same does the computer virus infects the server or the workstation. If the computer shuts down sometimes. That clears the virus from the RAM. Servers are vulnerable because if RAM-virus infects them it would not be removed from RAM-memory until the next boot. Servers are also involving most of the data. 

That is stored in the system. So that means if the spy tool is infecting the server. That requires that the operators must change passwords and other access keys to the system. Computer viruses are always advancing and hackers are always finding new weak points of the system. They might take things like routers of the system to target. And double the entire data flow of the system. Then they can route the other data flow to their servers. 

If we are thinking of the form of the AI. That is "only" a database where is stored the solutions for a certain type of problem. Or actually, those databases involve information that the system uses to respond to a certain type of data. The data that travels in the system activates a certain database. And then the AI can solve problems. 

Machine learning means that the computer can automatically grow the data mass. And make connections between databases. The automatically learning machines can also call "open systems". The "closed" or "fixed systems" require that the operators are involving the solution. And the fixed system doesn't grow the data mass or connections between databases without operators. 

Anyway, without those databases the AI is helpless. If the computer viruses hit those databases. The system would turn useless. This means that also the AI requires virus scanners against data viruses. The data viruses are normally detected when they attempt to write themselves to hard disks. 

But there are also RAM viruses that are remaining in RAM. Those viruses are hard to detect. The virus doesn't write its code to hard disks. So the virus scanners are not able to see that thing. 

This is why they are called Stealth-viruses. But also the regular computer viruses require to download their code to the RAM-memory of the computer. Regular computer viruses are normally acting always the same way. They are involving virus code. 

The virus writers normally pack that malicious code in the form of EXE or COM-file that is only renamed for looking like an innocent file. 

The next type of virus is easy to deny. The write protection of Autoexec was enough. And the new operating systems didn't include that file. so making this kind of virus was suitable only in Windows 9X.

Then the program that is some kind of macro as an example the BAT file just replaces the last line in the "Autoexec.Bat"  by the command line that renames the virus file ("virus" to Virus.exe). Replacement of autoexec.bat happened by simply deleting Autoexec and replacing it with the macro that is renamed to Autoexec.Bat. And then it will activate the virus at the next boot session. Or sometimes there was only a command what deletes the system files. 

Modern virus scanners are scanning also the code what the files involved. And if there is some kind of virus code. The firewall and anti-virus program sends the information of that virus to the network control. And that might close even the internet connection of the systems. Also denying the echoing commands and auto-driving programs can protect computers against viruses. 

But computer viruses still exist. Modern malicious code is meant to steal information. They are more complicated than some viruses of the '90s. Those new viruses are also destroying only things like databases. And they can cause more damages than some virus that destroys the entire data system. If only the databases are destroyed. And the system is not used very often. That thing can cause a "nasty surprise" for people who should use the system. 


https://nexthop.ca/it-news/common-types-of-computer-viruses/


https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://en.wikipedia.org/wiki/AUTOEXEC.BAT


https://en.wikipedia.org/wiki/Computer_virus


Image: https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/



Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...