Skip to main content

The use of AI requires data security.

   

 The use of AI requires data security.



In the beginning, I must say that modern malicious software is searching data. It opens back gates to the system. And then that sends data to the third party. Another thing is that in most security scenarios the destructive viruses are used to open roads to the data breakers. Those people can try to slip non-secured components into the system. 

This component can send the entire data to the attacker's system. It is not the same does the computer virus infects the server or the workstation. If the computer shuts down sometimes. That clears the virus from the RAM. Servers are vulnerable because if RAM-virus infects them it would not be removed from RAM-memory until the next boot. Servers are also involving most of the data. 

That is stored in the system. So that means if the spy tool is infecting the server. That requires that the operators must change passwords and other access keys to the system. Computer viruses are always advancing and hackers are always finding new weak points of the system. They might take things like routers of the system to target. And double the entire data flow of the system. Then they can route the other data flow to their servers. 

If we are thinking of the form of the AI. That is "only" a database where is stored the solutions for a certain type of problem. Or actually, those databases involve information that the system uses to respond to a certain type of data. The data that travels in the system activates a certain database. And then the AI can solve problems. 

Machine learning means that the computer can automatically grow the data mass. And make connections between databases. The automatically learning machines can also call "open systems". The "closed" or "fixed systems" require that the operators are involving the solution. And the fixed system doesn't grow the data mass or connections between databases without operators. 

Anyway, without those databases the AI is helpless. If the computer viruses hit those databases. The system would turn useless. This means that also the AI requires virus scanners against data viruses. The data viruses are normally detected when they attempt to write themselves to hard disks. 

But there are also RAM viruses that are remaining in RAM. Those viruses are hard to detect. The virus doesn't write its code to hard disks. So the virus scanners are not able to see that thing. 

This is why they are called Stealth-viruses. But also the regular computer viruses require to download their code to the RAM-memory of the computer. Regular computer viruses are normally acting always the same way. They are involving virus code. 

The virus writers normally pack that malicious code in the form of EXE or COM-file that is only renamed for looking like an innocent file. 

The next type of virus is easy to deny. The write protection of Autoexec was enough. And the new operating systems didn't include that file. so making this kind of virus was suitable only in Windows 9X.

Then the program that is some kind of macro as an example the BAT file just replaces the last line in the "Autoexec.Bat"  by the command line that renames the virus file ("virus" to Virus.exe). Replacement of autoexec.bat happened by simply deleting Autoexec and replacing it with the macro that is renamed to Autoexec.Bat. And then it will activate the virus at the next boot session. Or sometimes there was only a command what deletes the system files. 

Modern virus scanners are scanning also the code what the files involved. And if there is some kind of virus code. The firewall and anti-virus program sends the information of that virus to the network control. And that might close even the internet connection of the systems. Also denying the echoing commands and auto-driving programs can protect computers against viruses. 

But computer viruses still exist. Modern malicious code is meant to steal information. They are more complicated than some viruses of the '90s. Those new viruses are also destroying only things like databases. And they can cause more damages than some virus that destroys the entire data system. If only the databases are destroyed. And the system is not used very often. That thing can cause a "nasty surprise" for people who should use the system. 


https://nexthop.ca/it-news/common-types-of-computer-viruses/


https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://en.wikipedia.org/wiki/AUTOEXEC.BAT


https://en.wikipedia.org/wiki/Computer_virus


Image: https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://networkedinternet.blogspot.com/


Comments

Popular posts from this blog

Transcendence, or the ability to transcendent thinking may grow in teen's brains.

   "New research has discovered that transcendent thinking, which involves analyzing the broader implications of situations, can foster brain growth in adolescents. This form of thinking enhances brain network coordination, impacting developmental milestones and future life satisfaction. The study emphasizes the need for education that encourages deep, reflective thought, underscoring the critical role of adolescents in their own brain development". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) "Scientists at  USC Rossier School of Education’s Center for Affective Neuroscience, Development, Learning and Education (CANDLE) have discovered that adolescents who grapple with the bigger meaning of social situations experience greater brain growth, which predicts stronger identity development and life satisfaction years later". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) The transcendenc

Higgs field and the speed of light

Dimensions are energy levels. When the difference between energy levels between two objects rises too high, they lose their ability to interact with each other. And the problem with crossing the speed of light is that researchers cannot pump enough energy that the particle can jump to the fourth dimension.  When a particle closes speed of light its size turns smaller, and finally, a particle cannot turn smaller anymore. And that thing is the cosmic speed limit. The light cone is the model that for crossing the speed of light the particle must push its structure through itself. And that is difficult because the particle's density turns so high that it cannot push its superstrings through that structure.  When we think that the Higgs field pulls energy through particles we might understand why only photons and other massless particles can reach the speed of light. The energy that travels through particles impacts the Higgs field. And that's why it will deny crossing the speed of

The Dark Matter as a cosmological discrepancy

The problem with cosmology and dark matter is that cosmologists cannot connect dark matter with standard cosmological models. Without knowledge about details of some parts of the system that makes impossible to make complete models of the system.  The fact is that we know only 5% of the universe. We cannot make it complete. And working models about the system where 95% remains unknown. so we know only a little part of the system called universe.  In some models, dark energy is connected with dark matter. The source of dark energy would be dark matter. But confirming this theory is impossible if we cannot see dark matter or dark energy.  In many models, the WIMPs (Weakly interacting massive particles are the thing. That makes the mysterious gravitational effect called dark matter. The form of WIMP is a mystery. There are also models where WIMPs are like gravitational skyrmions.  Or they could be overweight gravitons. But the problem is that nobody saw graviton yet.  There is the possibi