Skip to main content

Why is strong identification important in the world of the internet?



Strong identification is the term that means biometric recognition. In the network's world, everybody is at a distance of 15 seconds. That means we can make contact with people who are 5000 kilometers from us. But there is a possibility that this person lives next door to us. And that means we must be careful and think about what we are saying or writing on the net. 

But then we must realize that there are no harmless hackers. Even if, we think. That there is nothing to hide in our network. We forget one thing. Hackers can break into harmless networks to use that network as a platform to attack. 


The attack can be:


1) Attempt to steal vital information. 


2) Deliver propaganda and disinformation.


Both of those hostile actions can cause the internet will be closed. By connecting a cell phone to the Google account and using a cell phone-based login protocol the account's legal owner gets information if somebody tries to log in to that account without permission. The modern "watchdog" system tells if somebody tries to log in to the system without permission. 

The use of modern equipment makes those systems safer. And things like getting access to Facebook or some other social media accounts by removing the sim card from the cell phone is impossible. 

Hackers can use stolen social media accounts to send messages to the victim's children and ask if there is a paper in the parent's room where the password for some more important user accounts is. The message could be that "hi, I lost my just changed password, and that thing is in under my notebook would you send it to me". 

And then the kid sends that password. So we should teach our children that they should not give any passwords to anybody. Also, tell them that they should tell those kinds of attempts to their parents. 

That kind of attack by using social media to cheat other people to seek paper, where a user wrote a password and shares their data in SMS or social media message. Is a forgotten way to use social media in attacks. In that case, the attacker might borrow a sim card or telephone. That was left on the table after the workday. 

The user must always change the sim card's pin code. If the hacker has access to the office. There is the possibility that this attacker just asks for a new password for the boss' account by using those sim cards. Changing a sim card between telephones is not difficult. And if there is some kind of service for a certain telephone number, the hacker will use that thing for the attack. 

In every company are lists of clients' data. That data consists the contact information like telephone numbers that people like car mechanics can call when the car is ready. And there is the possibility that the hacker makes a social attack against the victim. In that case, the hacker might try to ask for the passwords for some governmental facilities. If their victim is working in those places. 

And how do hackers get that name? They might follow the list of lecturers in open lectures. There might read information like the ICT specialist of some data security company that is the military force's contractor or military forces itself. Then hackers will simply ask for the password. But another thing is that there are no safety data accounts. 

If hackers can break things like the recovery account of Google account, those persons might steal that user's identity. Hackers can steal passwords during lectures very easily. They can simply take a film of the hand movements of the victim. And then they can use slow motion to see where the fingers are on the keyboard. 

So how to act in those places? The best possible thing is to use a biometric login. That thing is impossible to break. And the second best method is to stay logged in. In that case, there is possible to download another browser where accounts' users are logging in to accounts. Then the person can make notes. And then uninstall that browser if that thing is unnecessary. 

In the same way, the person can open their account for lectures and other kinds of symposiums. If there is nothing important, that thing minimizes damages even if somebody steals passwords. Changing password often is not reasonable. Users must always write new passwords somewhere. And if that thing is some kind of paper, there is the possibility that the piece of paper will go to the wrong hands.

So when should a user change the password? When that person worked somewhere else than their own office by using a computer, that is not their property. They should change their password. But that thing is necessary only if the user uses a password. The keyloggers cannot break biometric sensors. And that means bimetric identification is the tool of the next generation. 


https://changeanditsmanagement.blogspot.com/2022/10/why-is-strong-identification-important.html


Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....