Skip to main content

Nobody is safe in the information superhighway.



The key element in modern data security is that all data that travels in the network is hostile. That means all routers, wifi-support stations and all other components like individual computers must have antivirus and firewalls. One memory card where a virus can pollute the entire network if somebody puts it in the computer or mobile device. And that's why the security team must protect all components that connect to the LAN segment. 

So the difference between past and modern ways to protect the LAN  is this. In the past, the network is surrounded by a firewall and antivirus. In the modern version, all data in the network is hostile. And whenever data travels through the router or switch antivirus checks the code. Also, things like bandit stations which are routers whose mission is to transmit data out from the net are made impossible to connect by denying the operations of the fixed LAN gates. 

There are always weaknesses in the systems. Even if the quantum encryption and qubits are making hacking difficult that doesn't mean that hacking is dead. Things like remote-controlled mobile telephones can slip into offices. And quadcopters can carry cameras into tactical points so intruders can see what happens on the screens. 

There is a possibility that in some offices the screen is just in a position where intruders can see the screen and record everything by using zoom objectives. And they can isolate things from the screen by using graphical programs. 

The mathematical theorem used to crack Pentagon's top-secret quantum algorithm. That means there is a possibility that some mistake can cause even the best-looking algorithm to be easy to crack. That means if the algorithm is protected the wrong way. There is a possibility that hackers can break the code by using a cheap laptop. 

Or if they can copy files from the system, there is the possibility that they simply use the password. Or they can slip into the office after the worktime, and if there are some password papers under the laptops or in an easy place to find that can be even more devastating than some kind of outcoming virtual attack. So security team must also make sure that physical data security is well-done. The screens must be out of windows and doors must be closed. 


https://phys.org/news/2022-11-mathematical-theorem-encryption-algorithm.html


https://designandinnovationtales.blogspot.com/


Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

Facebook and dominance of the media.

The position of Facebook is dominating and that causes concern. Facebook is a well-known and commonly used service. And that thing causes that the information is starting to pile up in that service. That information contains data that we might want to hide. Facebook is a network-based service that can use for many purposes from marketing to intelligence.  Facebook was down and the thing cost about half a million dollars per hour to that service. That shutdown has shown how dominating that service has been growing. Facebook is a powerful tool. It can use to track the networks of people.  Artificial intelligence can show the network map of the people who are using that service. The data that travels between certain members of the network can show how often those people are contacting each other. There is a lot of criticism against Facebook but the fact is that everybody is using that thing.  The attitudes toward Facebook are conflicting. People are criticizing that service ...