Data security plays a vital role in modern society.
The data security of the power system is one of the most important things in the world. Attacks against nations begin with a large-scale cyber attack, which mission is to bring chaos all around. The most vital targets that must be protected are the nuclear and other power plants that are delivering electric supply for the nation. The problem with the data- and cyber-attacks is that their source is easy to hide by using the chains of the remote-controlled computers.
And that means the cyber attack can take back if the own forces are not enough or losses are too high. The cyberattack is very to make, and it's always similar without depending is the maker of attack some hacker group or governmental organization. Or the hacker group can also work under the control of intelligence and military authorities. If the hackers are operating under the control of the government, that means there is no way to get them to court.
So how to handle the updates that are coming for highly secured servers
The updates for the control system should upload first to the server that uses the virtual systems. Those virtual systems can contain the same parts that real power plants use. This system can use for testing how the update controls the power supply system. And in the cases of nuclear facilities and their security, data security is an extremely important thing. If the control computer drives nuclear reactors wrong, that thing can cause a nuclear accident.
In some scenarios, the hackers who are trying to steal nuclear secrets programmed malicious software that is masked as a system update. And then that update will mess with the databases that are controlling nuclear reactors. This kind of thing can cause a nuclear catastrophe.
The most common version to install malicious software to the control systems of the power plants is to mark them as updates. That means that the update is the thing that causes the infection and gives the gate to the system. One way to protect things like the electric network is to download the updates for the control system to the auxiliary server where they are controlling the virtual system. The virtual system can be the nuclear power plant, which is not in use. That thing can help to find out if some updates are involving the harmful core.
The WhatsApp and data security
In the final paragraph, I will try to explain why WhatsApp-type applications are suitable and popular platforms for phishing attacks. One of the things that are seen is that social media and especially its P2P applications are used as a phishing attacks. The reason why those kinds of applications are used in phishing-type attacks is that there is nobody else, who sees the messages. In this case, the attacker uses trust for making a confidential relationship with the victim.
Because face-to-face communication makes feeling about the safe relationship, there are always people who are using this kind of relationship for illegal purposes. And the thing that the communication happens between two users without visible outside observers, these kinds of things are sometimes provocating people to ask questions and make offers that are not true.
Comments
Post a Comment