Skip to main content

Humans are the weakest ring in data security.





Social hacking is the new threat to data security. 


Intelligent firewalls and offensive security are the things that are making the system safe against traditional hacking. But the social hacking where is used voice transformation and virtual actors are the newest tools for hackers. Also, things like chemical interrogation can use for getting information from the users of the systems. 

Can there be safe computers? The answer is that hackers can break all computers and data systems in the world. Even if the system itself is safe, people who are using that system are the weak ring in the chain. The computers and data systems do not make mistakes. Humans are making all errors in the program code. There is possible to ask the confidential information from the users. Not even the best data security can protect the system against human errors. One of the biggest errors is to write passwords in a notebook. 

And then forget that notebook to the table. There is the possibility that the hostile actors are following interesting-looking people like bank workers and their superiorities. And then they just benefit from the moment. Or some office worker or other henchman who is somehow disappointed can deliver that notebook to some MC-gangs. So in that case the security leak is made because of revenge. 

Social hackers can play the team leaders or some kind of system support persons. And that kind of thing can risk all data in the system. Hackers or agents can interrogate people by using chemicals. Or the people can blackmail for giving confidential data of the systems. 

And even if all data travels in quantum channels, the system might be dangered. The hackers can try to slip into the system by using hybrid methods. They might ask for the password of the system from some persons who have access to the data. And then slip into the building by playing cleaners or simply making burglary. The hackers will just slip into the server room and steal a couple of hard disks. That thing means that all systems can be dangered very easily. 


The virtual actors and voice modification systems can danger the data security of the system. 


Data security is the race between people who are protecting systems. And hackers who try to penetrate the databases. The social hacking methods where people are using virtual actors and voice modification are the newest threat to data security. The deep-fake-based actors can try to slip into the net meetings. 

And of course, hackers can try to benefit from things like telephones that are forgotten on the table. They can simply steal the phone and then call in the name of the owner of the phone to the micro support for taking new passwords. In that case, there is not a match between SIM cards. That is stored in the list of people who are allowed to use that service. In those services should be the list of the telephone numbers that are allowed to get service. 

Of course, there is the possibility that people are not following orders. If people just don't care about the orders they mean nothing. Believing something is not the confirmed information. When we are making some rules for making data systems safe we must realize that we must follow that people are acting as there is written in orders. 

In the case of social hacking the operators should sometimes test are the rules followed. They should try to call the new passwords from the unauthorized telephones for seeing that people are looking is that phone number in the list? If the things like passwords are given to every single telephone that is used to call that information the data in the system might be dangered. 

()https://visionsoftheaiandfuture.blogspot.com/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

First time in history, astronomers saw that a planet falls in its star. Could that be the faith of theoretical Vulcan planet?

"As the Sun becomes a true red giant, the Earth itself may be swallowed or engulfed, but it will definitely be roasted as never before. However, it remains to be seen whether any of the effects of swallowing Mercury, Venus, or even possibly Earth will be noticeable by a distant alien civilization". (BigThink.com/At last: astronomers catch a star eating its innermost planet) The planet fell into a star that it orbited, or the nova eruption of a dying star destroyed the planet. That thing proved expectations that stars can eat their planets. At least when they start to expand to red giants. In other situations, the nova eruption from the dying star can destroy the entire planetary system. The star that ate its planet was the sun-type star that ran out of its fuel. And then the Nova eruption destroyed the planet near that star.  But there is the possibility that things like gravitation brake will cause a situation in which the planet falls into its sun. The situation could be th