Skip to main content

Data security plays a vital role in modern society.

 



Data security plays a vital role in modern society.


The data security of the power system is one of the most important things in the world. Attacks against nations begin with a large-scale cyber attack, which mission is to bring chaos all around. The most vital targets that must be protected are the nuclear and other power plants that are delivering electric supply for the nation. The problem with the data- and cyber-attacks is that their source is easy to hide by using the chains of the remote-controlled computers. 

And that means the cyber attack can take back if the own forces are not enough or losses are too high. The cyberattack is very to make, and it's always similar without depending is the maker of attack some hacker group or governmental organization. Or the hacker group can also work under the control of intelligence and military authorities. If the hackers are operating under the control of the government, that means there is no way to get them to court. 



So how to handle the updates that are coming for highly secured servers


The updates for the control system should upload first to the server that uses the virtual systems. Those virtual systems can contain the same parts that real power plants use. This system can use for testing how the update controls the power supply system. And in the cases of nuclear facilities and their security, data security is an extremely important thing. If the control computer drives nuclear reactors wrong, that thing can cause a nuclear accident. 

In some scenarios, the hackers who are trying to steal nuclear secrets programmed malicious software that is masked as a system update. And then that update will mess with the databases that are controlling nuclear reactors. This kind of thing can cause a nuclear catastrophe. 

The most common version to install malicious software to the control systems of the power plants is to mark them as updates. That means that the update is the thing that causes the infection and gives the gate to the system. One way to protect things like the electric network is to download the updates for the control system to the auxiliary server where they are controlling the virtual system. The virtual system can be the nuclear power plant, which is not in use. That thing can help to find out if some updates are involving the harmful core. 


The WhatsApp and data security


In the final paragraph, I will try to explain why WhatsApp-type applications are suitable and popular platforms for phishing attacks. One of the things that are seen is that social media and especially its P2P applications are used as a phishing attacks. The reason why those kinds of applications are used in phishing-type attacks is that there is nobody else, who sees the messages. In this case, the attacker uses trust for making a confidential relationship with the victim. 

Because face-to-face communication makes feeling about the safe relationship, there are always people who are using this kind of relationship for illegal purposes. And the thing that the communication happens between two users without visible outside observers, these kinds of things are sometimes provocating people to ask questions and make offers that are not true. 


Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...