Social hacking is the new threat to data security.
Intelligent firewalls and offensive security are the things that are making the system safe against traditional hacking. But the social hacking where is used voice transformation and virtual actors are the newest tools for hackers. Also, things like chemical interrogation can use for getting information from the users of the systems.
Can there be safe computers? The answer is that hackers can break all computers and data systems in the world. Even if the system itself is safe, people who are using that system are the weak ring in the chain. The computers and data systems do not make mistakes. Humans are making all errors in the program code. There is possible to ask the confidential information from the users. Not even the best data security can protect the system against human errors. One of the biggest errors is to write passwords in a notebook.
And then forget that notebook to the table. There is the possibility that the hostile actors are following interesting-looking people like bank workers and their superiorities. And then they just benefit from the moment. Or some office worker or other henchman who is somehow disappointed can deliver that notebook to some MC-gangs. So in that case the security leak is made because of revenge.
Social hackers can play the team leaders or some kind of system support persons. And that kind of thing can risk all data in the system. Hackers or agents can interrogate people by using chemicals. Or the people can blackmail for giving confidential data of the systems.
And even if all data travels in quantum channels, the system might be dangered. The hackers can try to slip into the system by using hybrid methods. They might ask for the password of the system from some persons who have access to the data. And then slip into the building by playing cleaners or simply making burglary. The hackers will just slip into the server room and steal a couple of hard disks. That thing means that all systems can be dangered very easily.
The virtual actors and voice modification systems can danger the data security of the system.
Data security is the race between people who are protecting systems. And hackers who try to penetrate the databases. The social hacking methods where people are using virtual actors and voice modification are the newest threat to data security. The deep-fake-based actors can try to slip into the net meetings.
And of course, hackers can try to benefit from things like telephones that are forgotten on the table. They can simply steal the phone and then call in the name of the owner of the phone to the micro support for taking new passwords. In that case, there is not a match between SIM cards. That is stored in the list of people who are allowed to use that service. In those services should be the list of the telephone numbers that are allowed to get service.
Of course, there is the possibility that people are not following orders. If people just don't care about the orders they mean nothing. Believing something is not the confirmed information. When we are making some rules for making data systems safe we must realize that we must follow that people are acting as there is written in orders.
In the case of social hacking the operators should sometimes test are the rules followed. They should try to call the new passwords from the unauthorized telephones for seeing that people are looking is that phone number in the list? If the things like passwords are given to every single telephone that is used to call that information the data in the system might be dangered.
()https://visionsoftheaiandfuture.blogspot.com/
Comments
Post a Comment