Computer Notes
Computer Notes
The Bad
With increasing frequency, news stories are focussing on data security breaches, and names
such as Julian Assange, Wikileaks, and Anonymous are making headlines. But when so much
of our modern lives are digital – from our private conversations, to our workplace records -
how can we ensure our protection?
Security breach, DDoS attacks, crippling everything often aim at financial robbery and target
individuals and corporations such as banks. However, money is not the only asset vulnerable
to attack; all kinds of records, images, and other sensitive data could be targeted depending
on the aims of the attacker, which include revenge.
The Good
They go by many names: ethical hackers; penetration testers; ‘white hats’. Some do it for
glory, whilst others do it for financial gain. Their aim is to expose the faults and flaws in a
security system – before it’s too late.
Most ‘white hat’ hackers work for computer security agencies, providing reports or training.
Typically, these experts will work from within a company, and operate with the company’s
full knowledge, to deliver reports on the threats and weaknesses faced. From time to time,
these hackers may also be used to expose cases of fraud.
The so-called ethical hacker is someone with the same technical skills and abilities as the
cyber criminals they try to defend against. They often court as much controversy as they do
praise, with some claiming that they are simply bad criminals trying to make amends. The
profession, however, is finding relevance and credibility as the digital world pervades.
In these times, companies and corporations, individuals, and even entire countries should
know which measures to take to protect their data from hacking. Every size of organisation
should employ adequate security measures, and due to this being an issue of increasing
importance, there is a growing demand for candidates with skills in this field.
Facial recognition is a quick and efficient verification system. It can be faster and more
convenient compared to other biometric technologies like fingerprints or retina scans. There
are also fewer touchpoints in facial recognition compared to entering passwords or PINs. It
supports multifactor authentication for additional security verification.
Improved accuracy
Facial recognition can be a more accurate way to identify individuals than simply using a
mobile number, email address, mailing address, or IP address. For example, most exchange
services, from stocks to cryptos, now rely on facial recognition to protect customers and
their assets.
Easier integration
Face recognition technology is compatible and integrates easily with most security software.
For example, smartphones with front-facing cameras have built-in support for facial
recognition algorithms or software code.
Fraud detection
Companies use facial recognition to uniquely identify users creating a new account on an
online platform. After this is done, facial recognition can be used to verify the identity of the
actual person using the account in case of risky or suspicious account activity.
Cybersecurity
Companies use facial recognition technology instead of, or in addition to, passwords to
strengthen cybersecurity measures. Face recognition software is also a convenient and
accurate security tool for unlocking smartphones and other personal devices.
Many airports use biometric data as passports, allowing travelers to skip long lines and walk
through an automated terminal to reach their gate faster. Face recognition technology in
the form of e-passports reduces wait times and can improve security.
Banking
Facial recognition can be used to control access to patient records. It can streamline the
patient registration process in a healthcare facility.
Machine Learning
Lateral Reading
In this day and age, staying informed is both essential and somewhat dangerous. The
danger I am referring to is the extremely high probability of being misinformed we are
facing whenever we read something, especially online.
Getting caught up in a misinformation campaign can leave you on the wrong side in an important
debate or even push your way of thinking in a completely wrong direction. That is where lateral
reading steps in and becomes your possible savior.
Lateral reading helps you determine an author's credibility, intent and biases by searching for
articles on the same topic by other writers (to see how they are covering it) and for other articles by
the author you're checking on.