Skip to main content

The use of AI requires data security.

   

 The use of AI requires data security.



In the beginning, I must say that modern malicious software is searching data. It opens back gates to the system. And then that sends data to the third party. Another thing is that in most security scenarios the destructive viruses are used to open roads to the data breakers. Those people can try to slip non-secured components into the system. 

This component can send the entire data to the attacker's system. It is not the same does the computer virus infects the server or the workstation. If the computer shuts down sometimes. That clears the virus from the RAM. Servers are vulnerable because if RAM-virus infects them it would not be removed from RAM-memory until the next boot. Servers are also involving most of the data. 

That is stored in the system. So that means if the spy tool is infecting the server. That requires that the operators must change passwords and other access keys to the system. Computer viruses are always advancing and hackers are always finding new weak points of the system. They might take things like routers of the system to target. And double the entire data flow of the system. Then they can route the other data flow to their servers. 

If we are thinking of the form of the AI. That is "only" a database where is stored the solutions for a certain type of problem. Or actually, those databases involve information that the system uses to respond to a certain type of data. The data that travels in the system activates a certain database. And then the AI can solve problems. 

Machine learning means that the computer can automatically grow the data mass. And make connections between databases. The automatically learning machines can also call "open systems". The "closed" or "fixed systems" require that the operators are involving the solution. And the fixed system doesn't grow the data mass or connections between databases without operators. 

Anyway, without those databases the AI is helpless. If the computer viruses hit those databases. The system would turn useless. This means that also the AI requires virus scanners against data viruses. The data viruses are normally detected when they attempt to write themselves to hard disks. 

But there are also RAM viruses that are remaining in RAM. Those viruses are hard to detect. The virus doesn't write its code to hard disks. So the virus scanners are not able to see that thing. 

This is why they are called Stealth-viruses. But also the regular computer viruses require to download their code to the RAM-memory of the computer. Regular computer viruses are normally acting always the same way. They are involving virus code. 

The virus writers normally pack that malicious code in the form of EXE or COM-file that is only renamed for looking like an innocent file. 

The next type of virus is easy to deny. The write protection of Autoexec was enough. And the new operating systems didn't include that file. so making this kind of virus was suitable only in Windows 9X.

Then the program that is some kind of macro as an example the BAT file just replaces the last line in the "Autoexec.Bat"  by the command line that renames the virus file ("virus" to Virus.exe). Replacement of autoexec.bat happened by simply deleting Autoexec and replacing it with the macro that is renamed to Autoexec.Bat. And then it will activate the virus at the next boot session. Or sometimes there was only a command what deletes the system files. 

Modern virus scanners are scanning also the code what the files involved. And if there is some kind of virus code. The firewall and anti-virus program sends the information of that virus to the network control. And that might close even the internet connection of the systems. Also denying the echoing commands and auto-driving programs can protect computers against viruses. 

But computer viruses still exist. Modern malicious code is meant to steal information. They are more complicated than some viruses of the '90s. Those new viruses are also destroying only things like databases. And they can cause more damages than some virus that destroys the entire data system. If only the databases are destroyed. And the system is not used very often. That thing can cause a "nasty surprise" for people who should use the system. 


https://nexthop.ca/it-news/common-types-of-computer-viruses/


https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://en.wikipedia.org/wiki/AUTOEXEC.BAT


https://en.wikipedia.org/wiki/Computer_virus


Image: https://www.pandasecurity.com/en/mediacenter/security/4-steps-avoid-viruses/


https://networkedinternet.blogspot.com/


Comments

Popular posts from this blog

The hydrogen-burning supernovas are interesting models.

"Researchers discovered a significant magnesium anomaly in a meteorite’s dust particle, challenging current astrophysical models and suggesting new insights into hydrogen-burning supernovas. (Artist’s concept.)Credit: SciTechDaily.com" (ScitechDaily, Rare Dust Particle From Ancient Extraterrestrial Meteorite Challenges Astrophysical Models) If the star is too heavy when its fusion reaction starts, it can detonate just at that moment, when its fusion starts. If the collapsing nebula is heavy enough, it can form a black hole straight from the nebula. But if the nebula's gravity is too heavy to  form  the blue giant or too  small  it can collapse  straight  into a black hole . If  the forming star is a little bit larger than the blue supergiants. It can explode immediately when the fusion starts.    The theory of hydrogen-burning supernovas consists  model  of the giant stars that explode immediately after their fusion starts. When the...

The ancient galaxy mirrors the Milky Way.

"This image shows the galaxy REBELS-25 as seen by the Atacama Large Millimeter/submillimeter Array (ALMA), overlaid on an infrared image of other stars and galaxies. The infrared image was taken by ESO’s Visible and Infrared Survey Telescope for Astronomy (VISTA). In a recent study, researchers found evidence that REBELS-25 is a strongly rotating disc galaxy existing only 700 million years after the Big Bang. This makes it the most distant and earliest known Milky Way-like galaxy found to date. Credit: ALMA (ESO/NAOJ/NRAO)/L. Rowland et al./ESO/J. Dunlop et al. Ack.: CASU, CALET" (ScitechDaily, Astronomers Baffled by Ancient Galaxy That Mirrors Modern Milky Way) Researchers found the youngest Milky Way-type galaxy. The distance to the galaxy is enormous. And the light that comes from that galaxy named REBELS-25 comes from the Universe that is only 700 million years old. The distance to that galaxy is enormous about 236 billion light years. And that means it's a very dista...

Transcendence, or the ability to transcendent thinking may grow in teen's brains.

   "New research has discovered that transcendent thinking, which involves analyzing the broader implications of situations, can foster brain growth in adolescents. This form of thinking enhances brain network coordination, impacting developmental milestones and future life satisfaction. The study emphasizes the need for education that encourages deep, reflective thought, underscoring the critical role of adolescents in their own brain development". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) "Scientists at  USC Rossier School of Education’s Center for Affective Neuroscience, Development, Learning and Education (CANDLE) have discovered that adolescents who grapple with the bigger meaning of social situations experience greater brain growth, which predicts stronger identity development and life satisfaction years later". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) The transcendenc...