Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the crayon-syntax-highlighter domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the otw_dcsw domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114
11 Security tech terms that you should know. » KryptosTechnology
Security tech terms

11 Security tech terms that you should know.

Security tech terms

With rising of technological breakthrough rapidly increase each and every day of this 21st century, it is important that you know these terms. I’m sure you don’t want to look like a complete idiot when hanging around with your Tech-savvy friends using these term and you don’t have any idea what there are talking about.


I

know there is a lot of people out there that dislike technology to a great level, but knowing these terms can get you in a lot of new and longer conversations which helps you to meet many new people.


So these terms that will be listed below its important for you read the terms, write them down, quiz your self on them just find what is suitable for you to learn them. Just knowing these can give you an advantage over others who are clueless to these terms, just know them! 🙂


11 Security Tech Terms


Brainjacking –


BrainJacking is the term used for hacking into brain implants, in the future, we may all have brain implant but they come with a risk of getting hijacked by hackers which can lead to the altering of our behavior and pain levels.


Machine Bias –


Machine Bias occurred when the data provided to the algorithm machine gets influenced over time by people whom the data was collected from, which the algorithm machine get expose to there prejudices and bias.


AI Cyber-Attacks –


AI chatbots are designed to trick people into giving up there private data & information like credit card information, private documents (ID, Password etc) and passwords.


Crowdturfing –


Crowdturfing is when you hire someone/company to write a review for you. This technique is used in a large-scale attack and make virtually almost impossible to separate what is REAL from what is FAKE


Instant Messaging –


Allows conversation between 2 or more person to be accessed to person within a moment which one can classify as real-time. 

An example of this application is Telegram, WhatsApp, Facebook Messenger etc.


Computer Hallucinations –


Computer Hallucinations are used by self Driving Cars which rely on AI Technology in which cameras and algorithms are used to figure what things are and how to build a clean rout around the obstacles.

The thing about AI Technology it doesn’t always recognize things with a 100% accuracy and the possible that a car with a built-in computer vision can always be hacked.

Checkout: China Facial Recognition technology That can scan the world population in 2 seconds


KeyLogger –


A Keylogger is a piece of software that store/record every keystroke that is made on a computer system. Keyloggers can be extremely dangerous because most keyloggers are now shipped with Trojans to improve there attacks and success rates.

Authentication –


This is the process which is used to verify a person or confirm one’s identity.

Examples: login Facebook, Twitter or any websites


Encryption –


The Process which allows one to convert Data into a secure form to hide the contents.


Macro Virus –


A Macro Virus is a special type of Malware used our regular word and spreadsheet document or pretty any within the Microsoft office suits to infect a computer system.


Exploit –


Software this been designed to gain unauthorized access to a computer a system through a system flaw which typically uses for malicious purposes.