Skip to main content

The AI is the ultimate tool for attackers and defenders.




The problem with conventional firewalls is this: they don't tell if there are some anomalies like the rising curve of the non-successful login attempts. The system will not tell operators. When somebody starts to use a computer from an unpredicted place. And that means. The data security fall doesn't come to knowledge until somebody tries to blackmail the victim. In that case, attackers can copy the data even to millions of servers. In that case, the damage happened anyway. The data can spread all over the internet. 

The process of how human brains think is a tool that makes us unique. A deep understanding of the human brain and how it forms thoughts can used as a model for AI enthusiasts to make systems, that imitate human thinking processes. Theoretically is possible to make an AI-based morphing neural network system. That operates as a virtual quantum computer. This means that the next-generation cloud-based architecture can be the new way to turn morphing neural networks into new types of cloud-based solutions. 

The morphing neural network-type clouds can make great advances for data security and it also can break data security. The morphing neural network that shares information between multiple actors can look like a regular cloud-based system. That system can compare information that users and other sensors drive into it. Neural networks see if some way to write the passwords and usernames is simultaneously repeating in the cases, where their access is denied. The system can see if a certain password is written in multiple places in a short period. 

Or somebody tests the entry to the system, using some old password. The problem with conventional firewalls and other conventional data security systems is this: they don't report if somebody tries to log in using some old password. That is given to some consultant. In that case, the system should tell the users or supervisors that some people use old, deactivated passwords, whose owners are not at work anymore. In that case, some ex-worker might sell the access to the system. 


The morphing neural network can run the complicated AI-based interactive system. The data security specialists can have the ChatGPT style tool. They can be used to secure the networks. The problem is that, Maybe quite soon also attackers have access to the ChatGPT-style AI tools that can generate viruses and malware code. The attackers that operate this kind of toolkit with advanced AI-based systems and morphing neural networks can make systematic attacks using different computers all the time. That makes it hard to deny the attack by closing access from certain IP addresses. 

The AI can search data from multiple sources. It can also make attacks by testing the public data that it collects from the net. The operator must only give orders to the system to start an attack against targeted systems. The system can take orders from the form where the user puts the company name, the name, and the IP address of the contact form. The username is normally easy to guess. And the only problem is this: where the attackers can be sure that some person is a worker who has access to the system. 

The AI can see the license plates of cars in the company parking lots. And then if it has access to the right systems the AI can search those cars from images. Then the attacker can go to look at the name from the mailbox, or just google that address.  If the targeted person has own company at that address the attacker can easily get the name of that person. 

Then the AI can search targeted company workers and their personal data like dog names or dog breeds and easy variables. If a person's hobbies are things like Marvel cartoons, the AI can use those names and common variables of those words. The AI can tell if there are some anomalies in the access attempts. And if there rise in a curve that shows non-successful login attempts, that thing should be told to the data security team. 

The thing. In the next-generation data security, the system should tell operators if there are some kind of anomalies in the system. The users must dare to tell if somebody asks questions about working places. Also, things like WEB cameras and images that they send must be checked, so that things like weapons and other interesting things are not visible. 


Comments

Popular posts from this blog

The hydrogen-burning supernovas are interesting models.

"Researchers discovered a significant magnesium anomaly in a meteorite’s dust particle, challenging current astrophysical models and suggesting new insights into hydrogen-burning supernovas. (Artist’s concept.)Credit: SciTechDaily.com" (ScitechDaily, Rare Dust Particle From Ancient Extraterrestrial Meteorite Challenges Astrophysical Models) If the star is too heavy when its fusion reaction starts, it can detonate just at that moment, when its fusion starts. If the collapsing nebula is heavy enough, it can form a black hole straight from the nebula. But if the nebula's gravity is too heavy to  form  the blue giant or too  small  it can collapse  straight  into a black hole . If  the forming star is a little bit larger than the blue supergiants. It can explode immediately when the fusion starts.    The theory of hydrogen-burning supernovas consists  model  of the giant stars that explode immediately after their fusion starts. When the interstellar nebula  falls  it can form

Transcendence, or the ability to transcendent thinking may grow in teen's brains.

   "New research has discovered that transcendent thinking, which involves analyzing the broader implications of situations, can foster brain growth in adolescents. This form of thinking enhances brain network coordination, impacting developmental milestones and future life satisfaction. The study emphasizes the need for education that encourages deep, reflective thought, underscoring the critical role of adolescents in their own brain development". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) "Scientists at  USC Rossier School of Education’s Center for Affective Neuroscience, Development, Learning and Education (CANDLE) have discovered that adolescents who grapple with the bigger meaning of social situations experience greater brain growth, which predicts stronger identity development and life satisfaction years later". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) The transcendenc

The future of supercomputing can be molecular.

"Researchers have developed new molecular designs that mimic brain processes to boost computing power and efficiency. This novel approach supports robust AI applications and represents a significant advance in sustainable computing. Credit: SciTechDaily.com" (ScitechDaily, Unlocking AI’s Future With a New Molecular Computing Breakthrough) The future of computing can be molecular, says an article in ScitechDaily.com. The fact is that helix molecules like DNA can be key to room-temperature quantum computing. The idea is this. There are two DNA molecules side-by-side. Then, the system drives data into the first molecule. After that, the data packet jumps into another DNA. That means the DNA transforms the row-type data into linear data. In that case, the DNA pair acts as a qubit.  The qubit is the tool that turns row-form data into linear data. And it's possible to use a quantum computer as multiple simultaneously operating binary computers. Or it can operate as the fastest