Skip to main content

Why is strong identification important in the world of the internet?



Strong identification is the term that means biometric recognition. In the network's world, everybody is at a distance of 15 seconds. That means we can make contact with people who are 5000 kilometers from us. But there is a possibility that this person lives next door to us. And that means we must be careful and think about what we are saying or writing on the net. 

But then we must realize that there are no harmless hackers. Even if, we think. That there is nothing to hide in our network. We forget one thing. Hackers can break into harmless networks to use that network as a platform to attack. 


The attack can be:


1) Attempt to steal vital information. 


2) Deliver propaganda and disinformation.


Both of those hostile actions can cause the internet will be closed. By connecting a cell phone to the Google account and using a cell phone-based login protocol the account's legal owner gets information if somebody tries to log in to that account without permission. The modern "watchdog" system tells if somebody tries to log in to the system without permission. 

The use of modern equipment makes those systems safer. And things like getting access to Facebook or some other social media accounts by removing the sim card from the cell phone is impossible. 

Hackers can use stolen social media accounts to send messages to the victim's children and ask if there is a paper in the parent's room where the password for some more important user accounts is. The message could be that "hi, I lost my just changed password, and that thing is in under my notebook would you send it to me". 

And then the kid sends that password. So we should teach our children that they should not give any passwords to anybody. Also, tell them that they should tell those kinds of attempts to their parents. 

That kind of attack by using social media to cheat other people to seek paper, where a user wrote a password and shares their data in SMS or social media message. Is a forgotten way to use social media in attacks. In that case, the attacker might borrow a sim card or telephone. That was left on the table after the workday. 

The user must always change the sim card's pin code. If the hacker has access to the office. There is the possibility that this attacker just asks for a new password for the boss' account by using those sim cards. Changing a sim card between telephones is not difficult. And if there is some kind of service for a certain telephone number, the hacker will use that thing for the attack. 

In every company are lists of clients' data. That data consists the contact information like telephone numbers that people like car mechanics can call when the car is ready. And there is the possibility that the hacker makes a social attack against the victim. In that case, the hacker might try to ask for the passwords for some governmental facilities. If their victim is working in those places. 

And how do hackers get that name? They might follow the list of lecturers in open lectures. There might read information like the ICT specialist of some data security company that is the military force's contractor or military forces itself. Then hackers will simply ask for the password. But another thing is that there are no safety data accounts. 

If hackers can break things like the recovery account of Google account, those persons might steal that user's identity. Hackers can steal passwords during lectures very easily. They can simply take a film of the hand movements of the victim. And then they can use slow motion to see where the fingers are on the keyboard. 

So how to act in those places? The best possible thing is to use a biometric login. That thing is impossible to break. And the second best method is to stay logged in. In that case, there is possible to download another browser where accounts' users are logging in to accounts. Then the person can make notes. And then uninstall that browser if that thing is unnecessary. 

In the same way, the person can open their account for lectures and other kinds of symposiums. If there is nothing important, that thing minimizes damages even if somebody steals passwords. Changing password often is not reasonable. Users must always write new passwords somewhere. And if that thing is some kind of paper, there is the possibility that the piece of paper will go to the wrong hands.

So when should a user change the password? When that person worked somewhere else than their own office by using a computer, that is not their property. They should change their password. But that thing is necessary only if the user uses a password. The keyloggers cannot break biometric sensors. And that means bimetric identification is the tool of the next generation. 


https://changeanditsmanagement.blogspot.com/2022/10/why-is-strong-identification-important.html


Comments

Popular posts from this blog

The LK-99 could be a fundamental advance even if it cannot reach superconductivity in 400K.

The next step in superconducting research is that LK-99 was not superconducting at room temperature. Or was it? The thing is that there is needed more research about that material. And even if it couldn't reach superconductivity in 400K that doesn't mean that material is not fundamental. And if LK-99 can maintain its superconductivity in 400K that means a fundamental breakthrough in superconducting technology.  The LK-99 can be hype or it can be the real thing. The thing is, anyway, that high-voltage cables and our electric networks are not turning superconducting before next summer. But if we can change the electric network to superconducting by using some reasonable material. That thing can be the next step in the environment. Superconductors decrease the need to produce electricity. But today cooling systems that need lots of energy are the thing that turn superconductors that need low temperatures non-practical for everyday use.  When the project begins there is lots of ent

Black holes, the speed of light, and gravitational background are things that are connecting the universe.

 Black holes, the speed of light, and gravitational background are things that are connecting the universe.  Black holes and gravitational waves: is black hole's singularity at so high energy level that energy travels in one direction in the form of a gravitational wave.  We normally say that black holes do not send radiation. And we are wrong. Black holes send gravitational waves. Gravitational waves are wave movement or radiation. And that means the black holes are bright gravitational objects.  If we can use water to illustrate the gravitational interaction we can say that gravitational waves push the surface tension out from the gravitational center. Then the other quantum fields push particles or objects into a black hole. The gravitational waves push energy out from the objects. And then the energy or quantum fields behind that object push them into the gravitational center.  The elementary particles are quantum fields or whisk-looking structures. If the gravitational wave is

The CEO of Open AI, Sam Altman said that AI development requires a similar organization as IAEA.

We know that there are many risks in AI development. And there must be something that puts people realize that these kinds of things are not jokes. The problem is how to take control of the AI development. If we think about international contracts regarding AI development. We must realize that there is a possibility that the contract that should limit AI development turns into another version of the Nuclear Non-Proliferation Treaty. That treaty didn't ever deny the escalation of nuclear weapons. And there is a big possibility that the AI-limitation contracts follow the route of the Nuclear Non-Proliferation Treaty.  The biggest problem with AI development is the new platforms that can run every complicated and effective code. That means the quantum computer-based neural networks can turn themselves more intelligent than humans. The AI has the ultimate ability to learn new things. And if it runs on the quantum-hybrid system that switches its state between binary and quantum states,