Skip to main content

Offensive security and AI are powerful tools.


The purpose of AI in network security is to support the people and uncover if somebody is telling wrong information. The mission of those things is to see if something works the wrong way. 

The most important thing in data security is to know what kind of attacker might attempt to steal data. In all companies are things that somebody wants. And one of the things is money. The "bad guys" might just want to get the money from the bank account. But in some firms, some secrets are touching the security of the state. 

But all development and research are interest in industrial spies. Those people want to use other people's work without paying licenses and other payments. They want to steal the work of other people and make money with that. 

So knowing the data that is wanted to secure makes sure that the data security team can predict what kind of attackers they are facing. If the attacker is governmental like some intelligence agency, making crime reports does not affect. Things like mobile solutions are interesting the governmental operators. So the company must not necessarily develop missile systems or stealth aircraft for facing the attack, that comes from somewhere far away from the east. 

The reason why things like data security are automatized is that it should eliminate the humanitarian effect. But the fact is that these kinds of systems are always hybrid tools. Artificial intelligence is working as an assistant for people. Who is responsible for the security of the systems. Artificial intelligence can collect data about things, is somebody making something wrong. 

If some people are making the inspection tour around the house. That system sees are they visit in all places that are marked in the list. If those people are not following orders, they are at risk for security. The offensive security means that the workspaces are searched for eavesdropping. 

AI-based network security is the new and powerful tool for securing data. The AI can see things what the normal security manager doesn't see or even realize. There are many layers that AI can manage very effectively, and it can make the profile of all workers by collecting data about things, what people are doing. And if the data, that the user search is changed that thing might cause that something is wrong. 

The weakest point in all data security is humans. Even the most secured systems are vulnerable if the humans who use them are somehow leaking the passwords. In the most traditional model, the "bad guys" are just hitting the person, and force their victim to tell the password and username. That's why face-to-face meetings are also important in working life. And of course, security personnel might follow the workers to home and observe their meetings if there is something wrong. 

During those meetings, the person can tell that if there is something wrong and tell about the strange people who may hang around some workers. Also, there is good to see what kind of questions people are asking. Is some person suddenly start to show interest in the hobbies of the family members of the key persons of the company? Or is some person's behavior changed somehow?

During the network meetings, the AI can see is there a possibility that some people who are involving the meetings are virtual. If the voice of the participant seems somehow synthetic, the system can send the warning to system supervisors. Even the most intelligent systems are requiring people, who are keeping it clean from bugs. The modern eavesdrop systems are not listening only to people. They are also listening to the internet. There is the possibility to put the small WLAN support station to the network connection cable. And route all data through that station. 

When we are thinking about the changing of hacking. Data that is collected from the network must continue all the time. The network security people must always see, what are the settings of the routers. Is some router programmed to double data, and of course the connections must be check because there is the possibility that somebody has installed the "bandit station" to network. 

But new technology brings new threats. The quadcopters can fly to the next roof, and they can equip with cameras, which can see screens that are seen from the window. They can also use laser microphones for uncovering secrets. Laser microphones are seeing the oscillation of the windows and that oscillation transmits speech to the surveillance operators. 

Modern eavesdropping systems cannot detect so easily as traditional systems. They can record data in passive mode, and only when they get radio commands, those systems are releasing the data. So that means they are hard to detect by using traditional methods. 

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....