THIS POST IS CONTINUED FROM PART 19, BELOW--
https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html
Nicolas C.D September 16, 2020 at 1:16 AM
This is insane, imagine 10 years from now.
https://ajitvadakayil.blogspot.com/2020/09/punishment-for-making-deep-fake-porn.html
Capt. Ajit Vadakayil September 16, 2020 at 4:40 AM
DEEP FAKES HAVE THE CAPABILITY TO START WORLD WARS..
THE FRENCH QUEEN WAS BEHEADED BY HER OWN PEOPLE BECAUSE JEW ROTHSCHILD WROTE IN HIS NEWSPAPER THAT SHE SAID " IF PEOPLE DONT GAVE BREAD THEN THEY CAN EAT CAKE"
THE QUEEN NEVER SAID THAT.. SHE WAS A KIND LADY..
http://ajitvadakayil.blogspot.com/2015/11/the-french-revolution-conceived-and.html
IN THE SHRADDHA KAPOOR DEEP FAKE , THE ONLY WAY I COULD MAKE OUT THAT THE VIDEO IS A DEEP FAKE IS --
-- BECAUSE THE WASTED FAKE WHITE WOMAN DID NOT HAVE A SVELTE TONED FIGURE LIKE SHRADDHA KAPOOR .. SHE WOULD NOT EVEN KNOW WHAT A GYM LOOKS LIKE..
capt ajit vadakayil
..
Let this be IA
IT CANNOT DECIPHER TONE ( I KILLED THE CLERK !? --OF MY COUSIN VINNY )
- https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html
IN ADDITION TO M SEVERAL WARNINGS TO PMO ABOUT ZOOM THAT IT LACKS THE FULL TYPE OF END-TO-END ENCRYPTION ..
ZOOM COMPANY GOT SHIT ON FACE OVER SECURITY AND PRIVACY-RELATED ISSUES EVER SINCE THE REPORTS OF ZOOMBOMBING CAME TO LIGHT.
ZOOMBOMBING OR ZOOM RAIDING IS THE UNWANTED INTRUSION INTO A VIDEO CONFERENCE CALL BY AN INDIVIDUAL, CAUSING DISRUPTION. THE TERM BECAME POPULARIZED IN 2020, AFTER THE COVID-19 PANDEMIC FORCED MANY PEOPLE TO STAY AT HOME AND VIDEOCONFERENCING IS USED ON A LARGE SCALE BY BUSINESSES, SCHOOLS, AND SOCIAL GROUPS.
FBI SAID THAT THEY HAVE RECEIVED OVER 240 REPORTS OF “ZOOM-BOMBING” IN WHICH HIJACKERS BROADCASTED MATERIAL DEPICTING CHILD SEXUAL ABUSE TO UNSUSPECTING USERS.
ENCRYPTION IS USED TO PROTECT THE IDENTITY OF USERS, CALL DATA BETWEEN ZOOM CLIENTS AND ZOOM'S INFRASTRUCTURE, AND MEETING CONTENTS.
WHEN A ZOOM CLIENT IS AUTHORIZED TO JOIN A MEETING, THAT CLIENT IS GIVEN A 256-BIT SECURITY KEY FROM ZOOM'S SERVER.
BUT THE ZOOM SERVER RETAINS THE SECURITY KEY PROVIDED TO MEETING PARTICIPANTS, THEREBY LACKING TRUE END-TO-END KEY MANAGEMENT AND ENCRYPTION.
THE LACK OF FULL END-TO-END ENCRYPTION MEANS THAT AN ATTACKER WHO CAN MONITOR ZOOM'S SERVER INFRASTRUCTURE AND GAIN ACCESS TO THE MEMORY OF THE RELEVANT ZOOM SERVERS COULD DEFEAT THE ENCRYPTION FOR A SPECIFIC MEETING.
AS SUCH, THAT PERSON COULD THEN VIEW THE SHARED MEETING KEY, DERIVE SESSION KEYS, AND DECRYPT ALL MEETING DATA.
https://support.zoom.us/hc/en-us/articles/201361943-New-updates-for-iOS
NEW DOCUMENT FROM ZOOM ILLUSTRATES HOW THE COMPANY HOPES TO CHICKEN UP—NAY-- BEEF UP THE SECURITY AND PRIVACY OF ITS VIRTUAL MEETING PLATFORM.
ALL ZOOM ROOMS WILL HAVE ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS ENABLED STARTING JUNE 30, 2020..
TO FIX SOME OF ITS SECURITY HOLES, ZOOM OUTLINED THE GOALS OF ITS PROPOSAL AS FOLLOWS: 1) ONLY AUTHORIZED MEETING PARTICIPANTS SHOULD HAVE ACCESS TO THEIR MEETING'S DATA; 2) ANYONE EXCLUDED FROM A MEETING SHOULD NOT HAVE THE ABILITY TO CORRUPT THE CONTENT OF THAT MEETING; 3) IF A MEETING PARTICIPANT ENGAGES IN ABUSIVE BEHAVIOR, THERE SHOULD BE AN EFFECTIVE WAY TO REPORT THAT PERSON TO PREVENT FURTHER ABUSE.
https://www.youtube.com/watch?v=-dgW6_n8XsQ
WITH ZOOM 5.0 UPDATE, SUPPORT FOR AES 256 BIT GCM ENCRYPTION WAS ADDED 256-BIT ENCRYPTION IS MUCH STRONGER THAN 128 BIT AS A BIGGER KEY SIZE HAS A HIGHER CHANCE OF REMAINING SECURE. THIS MEANS THAT IF SOMEONE WERE TO ATTEMPT TO HACK ENCRYPTED DATA, 256-BIT ENCRYPTED DATA WOULD TAKE SIGNIFICANTLY LONGER TO CRACK.
AES 256-BIT GCM ENCRYPTION WILL BE ENABLED SYSTEM-WIDE FROM MAY 30 IN ZOOM AND USERS WILL NEED TO HAVE UPDATED CLIENTS AND APP TO JOIN MEETINGS. THE SECURITY ICON IN THE MEETING WILL LET THE HOST EASILY LOCK/UNLOCK MEETINGS, ENABLE/DISABLE WAITING ROOMS, ENABLE/DISABLE IN-MEETING CHAT, ENABLE/DISABLE PARTICIPANT RENAMING, ENABLE/DISABLE SCREEN SHARING, REMOVE A PARTICIPANT, AND REPORT A PARTICIPANT..
ON JUNE 30, ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS WILL BE ENABLED. ZOOM ROOMS CONTROLLERS THAT DO NOT HAVE THE RECOMMENDED VERSION 5.0 OR HIGHER WILL STOP FUNCTIONING.
ZOOM 5.0 INCLUDES SECURITY ENHANCEMENTS AND A STRONGER ENCRYPTION STANDARD, TO FURTHER ENSURE THAT ZOOM CONFERENCES CANNOT BE INTERCEPTED BY UNINVITED PEOPLE.
AFTER THE MEETING STARTS, ALL PARTICIPANTS WILL SEE A MEETING SECURITY CODE THEY CAN USE TO VERIFY THAT NO ONE'S CONNECTION TO THE MEETING WAS INTERCEPTED. THE HOST CAN READ THIS CODE OUT LOUD, AND ALL PARTICIPANTS CAN CHECK THAT THEIR CLIENTS DISPLAY THE SAME CODE.
IF THE HOST LEAVES, THEY CAN NOW EASILY SELECT A NEW HOST AND HAVE THE CONFIDENCE THAT THE RIGHT PERSON IS LEFT WITH HOST PRIVILEGES..
CM OR GALOIS / COUNTER MODE ENCRYPTION IS AN ALGORITHM FOR AUTHENTICATED ENCRYPTION OF DATA THAT PROVIDES ASSURANCE OF AUTHENTICITY OF THE CONFIDENTIAL DATA.
CONTINUED TO 2--
LARGE ORGANIZATIONS FACE THE CHALLENGE OF HOW TO DISTINGUISH 'AUTHORIZED' ACCESS FROM ONE THAT IS NOT FOR A LEGITIMATE WORK-RELATED PURPOSE, DURING THIS COVID-19 PANDEMIC WHERE WORK AT HOME REMOTE ACCESS CANOT BE AVOIDED
ORGANIZATIONS MUST BUILD A FOOL-PROOF AND EFFECTIVE FOUNDATION FOR A REMOTE WORKPLACE.
THIS INCLUDES TAKING STOCK OF COMPANY ASSETS, METHODICALLY ENCRYPTING ON-PREMISES, MOBILE DEVICES AND APPLICATIONS, PLUS PROVIDING ACCESS TO CORPORATE DATA AND COLLABORATION CHANNELS, SUCH AS THROUGH A SECURE VIRTUAL PRIVATE NETWORK (VPN).
WITH THE INCREASING NUMBER OF PEOPLE BRINGING THEIR DEVICES TO WORK AND THE CONSTANT APPEARANCE OF NEW SOFTWARE SOLUTIONS AND CLOUD SERVICES, EMPLOYEES ARE USING MORE AND MORE TECHNOLOGIES WITHOUT NOTIFYING THE CORPORATE IT TEAM ABOUT THEM
MULTI-FACTOR AUTHENTICATION / MFA REQUIRES AN EXTRA LAYER OF AUTHENTICATION, SUCH AS ENTERING A ONE-TIME PIN NUMBER OR FACIAL RECOGNITION IN ADDITION TO CREDENTIALS. THIS PROCESS ENSURES THE PERSON ACCESSING YOUR NETWORK IS WHO THEY SAY THEY ARE.
PRIVILEGED USERS, SUCH AS DATA ADMINISTRATORS, TYPICALLY HAVE COMPLETE ACCESS TO THEIR ORGANIZATION'S DATA, AND WHEN A WORK FROM HOME SITUATION IS MANDATED, THESE PERSONNEL WILL HAVE TO FACE THE ADDITIONAL CHALLENGE OF PROVIDING GRANULAR ACCESS TO CORPORATE RESOURCES.
THERE IS OFTEN A LACK OF CONTEXTUAL INFORMATION ABOUT USERS AND REQUESTERS OF DATA, WHICH IS A SIGNIFICANT FACTOR TO CONSIDER BEFORE GRANTING DATA PRIVILEGES.
THIS IS WHERE A PRIVILEGED ACCESS MANAGEMENT (PAM) STRATEGY PLAYS AN ESSENTIAL ROLE IN MAINTAINING DATA INTEGRITY. IMPLEMENTING AUTHENTICATION PROTOCOLS, AUTOMATED PASSWORD ENCRYPTION, AND REGULAR AUDITING AND REPORTING CAN ALL HELP ENTERPRISES MAINTAIN DATA SECURITY.
PRIVILEGE PROVIDES THE AUTHORIZATION TO OVERRIDE, OR BYPASS, CERTAIN SECURITY RESTRAINTS, AND MAY INCLUDE PERMISSIONS TO PERFORM SUCH ACTIONS AS SHUTTING DOWN SYSTEMS, LOADING DEVICE DRIVERS, CONFIGURING NETWORKS OR SYSTEMS, PROVISIONING AND CONFIGURING ACCOUNTS AND CLOUD INSTANCES, ETC.
BY DIALING IN THE APPROPRIATE LEVEL OF PRIVILEGED ACCESS CONTROLS, PAM HELPS ORGANIZATIONS CONDENSE THEIR ORGANIZATION’S ATTACK SURFACE, AND PREVENT, OR AT LEAST MITIGATE, THE DAMAGE ARISING FROM EXTERNAL ATTACKS AS WELL AS FROM INSIDER MALFEASANCE OR NEGLIGENCE.
A CENTRAL GOAL IS THE ENFORCEMENT OF LEAST PRIVILEGE, DEFINED AS THE RESTRICTION OF ACCESS RIGHTS AND PERMISSIONS FOR USERS, ACCOUNTS, APPLICATIONS, SYSTEMS, DEVICES (SUCH AS IOT) AND COMPUTING PROCESSES TO THE ABSOLUTE MINIMUM NECESSARY TO PERFORM ROUTINE, AUTHORIZED ACTIVITIES.
SHADOW IT DESCRIBES THOSE APPLICATIONS AND DEVICES EMPLOYEES USE FOR WORK BUT ARE NOT MANAGED BY THE IT ORGANIZATION
LACK OF SECURITY – LACK OF VISIBILITY AND CONTROL OVER NETWORK ELEMENTS ARE THE MAIN CYBERSECURITY RISKS OF USING SHADOW IT. THEY CREATE NUMEROUS WEAK SPOTS THAT HACKERS MAY USE FOR COMPROMISING A SYSTEM AND COLLECTING OR STEALING SENSITIVE BUSINESS INFORMATION
https://www.youtube.com/watch?v=vnz3txfrhtc
EXAMPLES OF SOME FREE OR FREEMIUM SHADOW IT SERVICES ARE GOOGLE DOCS, DROPBOX AND ZOOM. SHADOW IT HAS BECOME MORE PERVASIVE AS A RESULT OF THE WORK-FROM-HOME SHIFT. THE RISK LIES IN SHARING OR STORING BUSINESS FILES WITHIN THESE SHADOW IT APPS AND DEVICES. WHEN THIS HAPPENS, THE ORGANIZATION LOSES CONTROL OF DATA AND EXPOSES ITSELF TO A BREACH.
MOST EMPLOYEES USE SHADOW IT WITH THE GOOD INTENTION OF GETTING THEIR WORK DONE. HOWEVER, ORGANIZATIONS NEED POLICIES THAT SET CLEAR EXPECTATIONS AROUND USING OFFICE TECHNOLOGIES AND DATA. SUCH POLICIES CAN SIGNIFICANTLY REDUCE THE RISKS BROUGHT ON BY SHADOW IT.
CONTINUED TO 2--
SOMEBODY CALLED ME UP AND CRIED
CAPTAIN
YOU HAVE WRITTEN THAT BLUE OCEAN LEADERSHIP IS A LOT LIKE SOCCER TEAM DYNAMICS..
http://ajitvadakayil.blogspot.com/2010/12/team-work-team-dynamics-capt-ajit.html
http://ajitvadakayil.blogspot.com/2010/11/blue-ocean-leadership-capt-ajit.html
INDEED
IN THIRTY YEARS OF COMMAND CAPT AJIT VADAKAYILs SHIP NEVER FAILED AN INSPECTION AND ALWAYS OVER PERFORMED.
YOU CAN CALL THIS LUCK, BUT BELIEVE ME , THERE IS A METHOD TO THE MADNESS..
I PUSHED MY TEAM HAAAARD .. BUT NEVER ALLOWED MY TEAM TO BURN OUT..
I HAD A FINGER ON THEIR PULSE.
http://ajitvadakayil.blogspot.com/2010/11/old-sea-dog-capt-ajit-vadakayil.html
MY NEXT POST WILL BE ON THIS SUBJECT..
EVER HEARD OF "BIELSA BURNOUT "?
TO UNDERSTAND WHAT I WRITE
BINGE WATCH THE TV SERIAL ON AMAZON PRIME-- "TAKE US HOME , LEEDS UNITED"..
https://www.youtube.com/watch?v=iGJRWuJMpVo
CARLOS TEVEZ CALLS " EL LOCO " ( MAD MAN ) MARCELO BIELSA THE BEST COACH ON THE PLANET..
http://ajitvadakayil.blogspot.com/2011/09/tevez-mancini-fight-advise-to-soccer.html
BIELSA SPOTTED THE TALENT OF CARLOS TEVEZ EARLY..
GOLDEN BOOT WINNER TEVEZ, GAVE BIELSA AND ARGENTINA THE 2004 OLYMPICS SOCCER CUP.
WATCH THIS SPACE..
capt ajit vadakayil
..
TO BE CONTINUED
CAPT AJIT VADAKAYIL
..
WHEN YOU ARE IN THE OFFICE, WHETHER IT'S AN ACTUAL THING HAPPENING OR NOT, YOU FEEL LIKE PEOPLE ARE WATCHING. WHEN YOU ARE AT HOME, YOU DON'T FEEL THAT, SO PEOPLE DO FEEL A LITTLE BIT MORE ENTITLED TO PULL INFORMATION ( STEAL INTELLECTUAL RIGHTS ) OFF THEIR WORK MACHINE, OR SHARE THINGS IN A CERTAIN WAY.
71% OF BREACHES OVER THE PAST YEAR HAVE BEEN TIED TO INSIDE JOBS.
THE ABILITY TO WORK FROM HOME IS A PRIZED EMPLOYEE PERK THAT OFFERS WORKERS THE CHANCE TO FREE THEMSELVES FROM THE DAILY COMMUTE AND COMPLETE THEIR TASKS.
BEFORE THE PANDEMIC A LOT OF COMPANIES WERE AT MAYBE 25% OF THE SEATS AVAILABLE FOR WORK-FROM-HOME, AND NOW IN THIS NEW ENVIRONMENT YOU ARE CLOSE TO 98-100% WORK-FROM-HOME—OR COMPANIES LOSE BIG MONEY AND CANNOT SURVIVE.
EVEN IF YOUR COMPANY PROVIDES VIRTUAL PRIVATE NETWORK (VPN) ACCESS, YOUR COMPUTER (AND THE DATA IT STORES) – COULD BE COMPROMISED IF SOMEONE HACKS INTO YOUR HOME WI-FI NETWORK.
HENCE FORTH EMPLOYEE CONTRACTS, AND EMPLOYMENT AGREEMENTS… NEED TO MAKE IT VERY CLEAR THAT “THOU SHALT NOT STEAL OUR IP ”.
YOU HAVE TO LAY OUT CLEAR ACCESS PRIVILEGES, ACCESS RIGHTS
YOU NEED TO BE ABLE TO SHOW THAT SOMEONE EXCEEDED THEIR AUTHORIZED ACCESS TO A PROTECTED COMPUTER SYSTEM… WHICH BOILS DOWN TO, 'DID THEY DO SOMETHING THEY KNEW THEY SHOULDN’T HAVE?'"
SOME COMPANIES ARE ALLOWING LOCAL PRINTING; THAT IS SOMETHING WHICH MUST BE DISABLED. USB PORTS THAT ARE OPEN SHOULD BE LOCKED DOWN . CAREFULLY MONITOR THOSE GIVING NOTICE OR BEING LET GO OR EVEN WHO GOT A BAD REVIEW / YEARLY RAISE ; THAT'S A POINT WHERE PEOPLE MAY TAKE DATA THEY SHOULD NOT BE TAKING..
MOST COMPANIES HAVE EVERYTHING LOGGED, BUT ACTIVE MONITORING NEEDS TO BE IN PLACE. AT LEAST YOU HAVE THE DETECTIVE CONTROL IF YOU CAN'T PREVENT IT
BRAINSTORMING NEEDS TO BE DONE-- HOW WE CAN ADAPT OUR IT SECURITY PORTFOLIO TO AN ENVIRONMENT WHERE EVERYONE IS WORKING FROM HOME, BUT STILL NEEDS ACCESS TO ALL THE TOOLS AND RESOURCES THEY HAD BEFORE?
HOW HAVE OUR POLICIES, AND SYSTEMS HELD UP TO THE UPSWING IN VPN USE, DISTRIBUTED WORKERS, SHIFTING MEETINGS ON-LINE, AND EVERYTHING ELSE THAT WE’VE HAD TO CHANGE TO ADAPT TO THIS “NEW NORMAL?”
THERE ARE SOME COMMON THREADS – FOR EXAMPLE, THE ADAGE ABOUT “UNKNOWN UNKNOWNS.”.. MAKING SURE THAT SENSITIVE DOCUMENTS AND FILES REMAIN CONFIDENTIAL IS DEFINITELY AN ISSUE REMOTE EMPLOYEES NEED TO TACKLE
IN COMPLICATED TIMES – LIKE THE NOVEL CORONAVIRUS PANDEMIC – PHISHERS ARE HOPING TO TAKE ADVANTAGE OF TRUSTING VICTIMS. THEY'LL OFTEN PRETEND THEY'RE SOMEONE WITHIN THE COMPANY, LIKE THE CEO OR A MANAGER, TO ESTABLISH FALSE TRUST. REMOTE WORKERS ARE EASY TARGETS BECAUSE THEY'RE NOT IN THE OFFICE AND, THEREFORE, HACKERS ARE HOPING THEY WON'T CHECK TO SEE IF THE EMAIL IS LEGITIMATE.
MANY REMOTE EMPLOYEES ARE USING THEIR PRIVATE HOME NETWORK, WHICH CAN INCREASE THE RISK OF LEAKED DATA. THIRD PARTIES MIGHT BE ABLE TO INTERCEPT AND ACCESS SENSITIVE EMAILS, PASSWORDS AND MESSAGES. THERE IS ALSO THE RISK THAT OTHERS WHO LIVE THE EMPLOYEE'S HOME (WHO USE THE SAME INTERNET CONNECTION) MAY SEE VALUABLE COMPANY DATA.
MORE THAN 50% OF EMPLOYEES REPORT TRANSFERRING FILES BETWEEN THEIR WORK AND PERSONAL COMPUTERS. IF EMPLOYEES OBTAIN SENSITIVE DATA AND STORE IT ON THEIR PERSONAL DEVICES, THAT PUTS MANY COMPANIES AT RISK – ESPECIALLY IF SAID DISGRUNTLED EMPLOYEE ENDS LEAVES THE COMPANY.
ANOTHER SOURCE OF VULNERABILITY IS THAT IF YOU, AS A REMOTE EMPLOYEE, ARE USING YOUR PERSONAL COMPUTER AND ARE NOT DOWNLOADING THE LATEST UPDATES, YOU COULD BE MORE VULNERABLE TO CYBERATTACKS.
MULTIFACTOR AUTHENTICATION GRANTS ACCESS TO THE DEVICE AND ALL SOFTWARE AFTER THE EMPLOYEE PROVIDES MORE THAN ONE FORM OF IDENTIFICATION.
ANYONE CAN MEMORIZE A PASSWORD OR STEAL A PHYSICAL DEVICE AND UNLOCK A COMPUTER. MULTIFACTOR AUTHENTICATION CAN PREVENT HACKERS FROM PHYSICALLY ACCESSING YOUR COMPANY DEVICE.
CONTINUED TO 2--