The key element in modern data security is that all data that travels in the network is hostile. That means all routers, wifi-support stations and all other components like individual computers must have antivirus and firewalls. One memory card where a virus can pollute the entire network if somebody puts it in the computer or mobile device. And that's why the security team must protect all components that connect to the LAN segment.
So the difference between past and modern ways to protect the LAN is this. In the past, the network is surrounded by a firewall and antivirus. In the modern version, all data in the network is hostile. And whenever data travels through the router or switch antivirus checks the code. Also, things like bandit stations which are routers whose mission is to transmit data out from the net are made impossible to connect by denying the operations of the fixed LAN gates.
There are always weaknesses in the systems. Even if the quantum encryption and qubits are making hacking difficult that doesn't mean that hacking is dead. Things like remote-controlled mobile telephones can slip into offices. And quadcopters can carry cameras into tactical points so intruders can see what happens on the screens.
There is a possibility that in some offices the screen is just in a position where intruders can see the screen and record everything by using zoom objectives. And they can isolate things from the screen by using graphical programs.
The mathematical theorem used to crack Pentagon's top-secret quantum algorithm. That means there is a possibility that some mistake can cause even the best-looking algorithm to be easy to crack. That means if the algorithm is protected the wrong way. There is a possibility that hackers can break the code by using a cheap laptop.
Or if they can copy files from the system, there is the possibility that they simply use the password. Or they can slip into the office after the worktime, and if there are some password papers under the laptops or in an easy place to find that can be even more devastating than some kind of outcoming virtual attack. So security team must also make sure that physical data security is well-done. The screens must be out of windows and doors must be closed.
https://phys.org/news/2022-11-mathematical-theorem-encryption-algorithm.html
https://designandinnovationtales.blogspot.com/
Comments
Post a Comment