Skip to main content

Humans are the weakest ring in data security.





Social hacking is the new threat to data security. 


Intelligent firewalls and offensive security are the things that are making the system safe against traditional hacking. But the social hacking where is used voice transformation and virtual actors are the newest tools for hackers. Also, things like chemical interrogation can use for getting information from the users of the systems. 

Can there be safe computers? The answer is that hackers can break all computers and data systems in the world. Even if the system itself is safe, people who are using that system are the weak ring in the chain. The computers and data systems do not make mistakes. Humans are making all errors in the program code. There is possible to ask the confidential information from the users. Not even the best data security can protect the system against human errors. One of the biggest errors is to write passwords in a notebook. 

And then forget that notebook to the table. There is the possibility that the hostile actors are following interesting-looking people like bank workers and their superiorities. And then they just benefit from the moment. Or some office worker or other henchman who is somehow disappointed can deliver that notebook to some MC-gangs. So in that case the security leak is made because of revenge. 

Social hackers can play the team leaders or some kind of system support persons. And that kind of thing can risk all data in the system. Hackers or agents can interrogate people by using chemicals. Or the people can blackmail for giving confidential data of the systems. 

And even if all data travels in quantum channels, the system might be dangered. The hackers can try to slip into the system by using hybrid methods. They might ask for the password of the system from some persons who have access to the data. And then slip into the building by playing cleaners or simply making burglary. The hackers will just slip into the server room and steal a couple of hard disks. That thing means that all systems can be dangered very easily. 


The virtual actors and voice modification systems can danger the data security of the system. 


Data security is the race between people who are protecting systems. And hackers who try to penetrate the databases. The social hacking methods where people are using virtual actors and voice modification are the newest threat to data security. The deep-fake-based actors can try to slip into the net meetings. 

And of course, hackers can try to benefit from things like telephones that are forgotten on the table. They can simply steal the phone and then call in the name of the owner of the phone to the micro support for taking new passwords. In that case, there is not a match between SIM cards. That is stored in the list of people who are allowed to use that service. In those services should be the list of the telephone numbers that are allowed to get service. 

Of course, there is the possibility that people are not following orders. If people just don't care about the orders they mean nothing. Believing something is not the confirmed information. When we are making some rules for making data systems safe we must realize that we must follow that people are acting as there is written in orders. 

In the case of social hacking the operators should sometimes test are the rules followed. They should try to call the new passwords from the unauthorized telephones for seeing that people are looking is that phone number in the list? If the things like passwords are given to every single telephone that is used to call that information the data in the system might be dangered. 

()https://visionsoftheaiandfuture.blogspot.com/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...