Sunday, December 25, 2022

Data security and artificial intelligence are the combinations that will revolutionize attacks and defense.



AI-based hacking tools are the biggest threat to data security. 


The difference between regular and AI-based hacking tools is incredible. AI-based software is more flexible than ever before. 

Things like docker-container technology in software development are making it possible that if somebody is fast, that person can slip malicious code into that system. That technology must, of course, customize for hacking purposes, but the idea is similar to the container. 

And the AI-based container-docker can slip malicious code in all files if that container-docker is in the right place. The perfect place for that "egg layer" container docker is the firewall or antivirus o the system. 


*The AI-based hacking tool that plays firewall or virus scanner can deny all other attacks that the attack that the software's creator makes. 

*Developing that kind of tool is expensive and hard work. So the attacker who creates that kind of complicated software doesn't want to share that stolen data with others. 

*AI-based hacking tools can attack targeted systems around the clock. They can make automatized attacks without breaks 24 hours per day. And change the IP address of the attacker. 

*The AI-based hacking software can stay in RAM (Read Access Memory) and that makes detecting that tool more difficult because it doesn't write itself to mass memory. 

*The productive AI can change the download link of malicious software. And that thing can be more dangerous than ever before. 

*The AI-based malicious software can change its code to different order to avoid security programs. When that code is pass the firewall and virus scanner. The AI-based computer virus or surveillance software can re-order their source code. And then, it will pollute the target system. 

*The AI-based malicious software can replace the virus scanner or antivirus. And that allows it gets access to the entire network communication that goes in and out of the computer. 

*There can be a destruction mode in that software. And when that malicious software is made it works, like steal 30 000 000 bitcoins. It can simply destroy itself. 


The AI can break any person's privacy in seconds. It can map the social network of individual people. 


Similar systems like artificial-based Chat GPT can use for searching and connect information from multiple sources. So the AI can use to track people and make full-sale profiles about the person and the social network of targeted persons. Nobody is safe against AI. 

Only one image where the person is marked is enough for the AI. And then AI can search social media to look at that person. Image recognition makes it possible to search the other users of that social media channel. And even if a targeted person would not use that channel the system can search the texts that are connected to images. 


If four persons have an account on the precise social media, but one doesn't have that person mentioned but doesn't have that account is probably the person who is the lost connection. The AI can search things like company logos from pencils and then can start to search the homepages of the companies. 

Then that system can see if there is a list of the workers and their pictures. The right to make action determines the effectiveness of the AI. If AI can use things like E-mail and telephone that thing causes that it can ask for the person's identity from the images. 

AI can make the system more effective than ever before. It can see if somebody has problems with computers. It seems that somebody wants to avoid social media. The AI can connect data taken from multiple surveillance cameras. And then it can see where some vehicle moves and what is the speed of that vehicle. 

The use of AI is the next-generation tool. And that thing means that we must flex with that thing. When people were afraid, that social media destroy their privacy they were wrong and right at the same time. When AI detects if somebody walks against red light the system can simply turn the other lights red. And that guarantees a safe crossing road. AI can also search for things like suspected fights and send the information to the officials. 

Opportunities for AI are limitless. The problem is that AI has no limits. If we believe in legislation, we are betraying ourselves. Criminals are not following the law. If we think that AI is a threat we must develop programs that can respond the AI-based hacking tools. So, we cannot just sit and wait. That Russians are making better AI. 


https://www.freecodecamp.org/news/a-practical-guide-to-containers-dfa66d37ac30/


https://en.wikipedia.org/wiki/Container_(abstract_data_type)


https://en.wikipedia.org/wiki/Docker_(software)



No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

The String theory and the 5-plet problem.

"Concept image of strange particles in an atom." (InterestingEngineering) The 5-plet is a strange 5-particle group detected in the...