Skip to main content

Nobody is safe in the information superhighway.



The key element in modern data security is that all data that travels in the network is hostile. That means all routers, wifi-support stations and all other components like individual computers must have antivirus and firewalls. One memory card where a virus can pollute the entire network if somebody puts it in the computer or mobile device. And that's why the security team must protect all components that connect to the LAN segment. 

So the difference between past and modern ways to protect the LAN  is this. In the past, the network is surrounded by a firewall and antivirus. In the modern version, all data in the network is hostile. And whenever data travels through the router or switch antivirus checks the code. Also, things like bandit stations which are routers whose mission is to transmit data out from the net are made impossible to connect by denying the operations of the fixed LAN gates. 

There are always weaknesses in the systems. Even if the quantum encryption and qubits are making hacking difficult that doesn't mean that hacking is dead. Things like remote-controlled mobile telephones can slip into offices. And quadcopters can carry cameras into tactical points so intruders can see what happens on the screens. 

There is a possibility that in some offices the screen is just in a position where intruders can see the screen and record everything by using zoom objectives. And they can isolate things from the screen by using graphical programs. 

The mathematical theorem used to crack Pentagon's top-secret quantum algorithm. That means there is a possibility that some mistake can cause even the best-looking algorithm to be easy to crack. That means if the algorithm is protected the wrong way. There is a possibility that hackers can break the code by using a cheap laptop. 

Or if they can copy files from the system, there is the possibility that they simply use the password. Or they can slip into the office after the worktime, and if there are some password papers under the laptops or in an easy place to find that can be even more devastating than some kind of outcoming virtual attack. So security team must also make sure that physical data security is well-done. The screens must be out of windows and doors must be closed. 


https://phys.org/news/2022-11-mathematical-theorem-encryption-algorithm.html


https://designandinnovationtales.blogspot.com/


Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...