Today: September 25, 2024
February 20, 2023
3 mins read

First case of monkey smallpox confirmed in a woman in Paraguay

First case of monkey smallpox confirmed in a woman in Paraguay

Several videos from a service station – which quickly went viral on social networks – once again brought to the fore the vulnerability of closed-circuit equipment, in addition to the fact that disclosure without consent damages the image of those affected.

In this regard, Gunter Krone, an expert in cybersecurity, explained in dialogue with Universo/Nación Media that any team that is connected to a network is vulnerable.

“The only more or less safe equipment It is the one that can be physically accessed and is isolated from any network, but once it is inside said network and, even worse, on the Internet, the vulnerability increases considerably compared to the computer alone”, he said.

Read: January: they exported auto parts, clothing and metals for US$ 115 million

In this regard, the expert indicated that all equipment that is connected to the internet and that is not correctly configured, it is a potential risk for cybersecurity, from the point of view of the administration of this device by the officials themselves.

“Assuming that they could have been the officials of the affected physical or legal institution the one who saw and observed the material, cut and sent them. It could even have been someone from outside, but in this case it is not possible to know who it could be, ”she explained.

In this regard, he said that in all cases, whether the workers themselves or outside the company are the ones who filter the videos, there is talk of a breach of security systems, as well also the commission of punishable acts, because it is carried out without permission or authorization. TOof over cause damage to the image, improper access to company information for other issues, which may lead to a summary, dismissal or compensation

He also said that install a closed circuit system, the person is given a username and password so that you can access from your cell phone, computer or other device and thus manage the control panel that allows you to see certain areas of the closed circuit television at home or work

However, he added that it is not normally requested – since not everyone knows – the password of the device itself, not only from the panel where part of the closed circuit is observed from the mobile phone or computer, but also from the management control panel of the equipment that it can be operated either from home or remotely with that password.

Read More: Violation of sanitary quarantine: causes are raised because defendants did not comply with measures

“I am not saying that the one who installs is going to be the one who is going to be able to see, since effectively the glass is the one that knows the username and password to the computer. If you did not ask him to change, most likely he will leave the one that comes by default from the factory. So normally the user is jasmine, the password jasmine back, if she doesn’t have a password, they are easy to guess, ”he said.

On this point, he stated that when sending the email the IP address can be discovered then when testing said address, it is placed in a browser with a colon and the ports that usually use decoders, that is, closed circuits such as NVRs and Network video recorders. If it appears, it is because the residence has closed circuit television.

“So when I The control panel appears and asks me to enter username and password, I can try anyone and, if I log in, I can see what you are doing at home and access all the recordings for the period of time that it stores.

In effect, he said that in that case it is not even necessary to be a company official or an acquaintance of the person affected to filter the videos. In this context, the expert recommended periodically reviewing the equipment and changing the data, since they constantly receive updates

Finally, about the viralization of the video of two workers at a service station, stressed that the dissemination of videos without the authorization of those affected is a crime. He Penal Code typifies such conduct and penalizes damage to communication and image.

In this case, what is done is damage the image of the person, since within their private enclosure or another, because they are not on public roads, the images were disseminated without the consent of the people. The victims that appear in the video can take action, as well as the owner of the video, which would be the company that I assume is a legal person,” he concluded.



Source link

Latest Posts

They celebrated "Buenos Aires Coffee Day" with a tour of historic bars - Télam
Cum at clita latine. Tation nominavi quo id. An est possit adipiscing, error tation qualisque vel te.

Categories

José Williams: "Congressmen receive a S/80 buffet only when it is full"
Previous Story

José Williams: “Congressmen receive a S/80 buffet only when it is full”

Next Story

From the torture of confinement to the pain of exile

Latest from Blog

rospigliosi

Convicted criminals should not apply

In the Plenary Session that last saw this opinion – almost four months ago – it was decided that the substitute text of the project that seeks to prevent those convicted of
Go toTop