The use of AI requires data security.
In the beginning, I must say that modern malicious software is searching data. It opens back gates to the system. And then that sends data to the third party. Another thing is that in most security scenarios the destructive viruses are used to open roads to the data breakers. Those people can try to slip non-secured components into the system.
This component can send the entire data to the attacker's system. It is not the same does the computer virus infects the server or the workstation. If the computer shuts down sometimes. That clears the virus from the RAM. Servers are vulnerable because if RAM-virus infects them it would not be removed from RAM-memory until the next boot. Servers are also involving most of the data.
That is stored in the system. So that means if the spy tool is infecting the server. That requires that the operators must change passwords and other access keys to the system. Computer viruses are always advancing and hackers are always finding new weak points of the system. They might take things like routers of the system to target. And double the entire data flow of the system. Then they can route the other data flow to their servers.
If we are thinking of the form of the AI. That is "only" a database where is stored the solutions for a certain type of problem. Or actually, those databases involve information that the system uses to respond to a certain type of data. The data that travels in the system activates a certain database. And then the AI can solve problems.
Machine learning means that the computer can automatically grow the data mass. And make connections between databases. The automatically learning machines can also call "open systems". The "closed" or "fixed systems" require that the operators are involving the solution. And the fixed system doesn't grow the data mass or connections between databases without operators.
Anyway, without those databases the AI is helpless. If the computer viruses hit those databases. The system would turn useless. This means that also the AI requires virus scanners against data viruses. The data viruses are normally detected when they attempt to write themselves to hard disks.
But there are also RAM viruses that are remaining in RAM. Those viruses are hard to detect. The virus doesn't write its code to hard disks. So the virus scanners are not able to see that thing.
This is why they are called Stealth-viruses. But also the regular computer viruses require to download their code to the RAM-memory of the computer. Regular computer viruses are normally acting always the same way. They are involving virus code.
The virus writers normally pack that malicious code in the form of EXE or COM-file that is only renamed for looking like an innocent file.
The next type of virus is easy to deny. The write protection of Autoexec was enough. And the new operating systems didn't include that file. so making this kind of virus was suitable only in Windows 9X.
Then the program that is some kind of macro as an example the BAT file just replaces the last line in the "Autoexec.Bat" by the command line that renames the virus file ("virus" to Virus.exe). Replacement of autoexec.bat happened by simply deleting Autoexec and replacing it with the macro that is renamed to Autoexec.Bat. And then it will activate the virus at the next boot session. Or sometimes there was only a command what deletes the system files.
Modern virus scanners are scanning also the code what the files involved. And if there is some kind of virus code. The firewall and anti-virus program sends the information of that virus to the network control. And that might close even the internet connection of the systems. Also denying the echoing commands and auto-driving programs can protect computers against viruses.
But computer viruses still exist. Modern malicious code is meant to steal information. They are more complicated than some viruses of the '90s. Those new viruses are also destroying only things like databases. And they can cause more damages than some virus that destroys the entire data system. If only the databases are destroyed. And the system is not used very often. That thing can cause a "nasty surprise" for people who should use the system.
https://nexthop.ca/it-news/common-types-of-computer-viruses/
https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/
https://en.wikipedia.org/wiki/AUTOEXEC.BAT
https://en.wikipedia.org/wiki/Computer_virus
Image: https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/
https://networkedinternet.blogspot.com/
Comments
Post a Comment