Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> Special God of War

Interesting findings

Previous page        Return to Catalog        Next page

    You can search "Special God of War" in Baidu to find the latest chapter!

    The Falklands is definitely one of the most advanced countries in Asia in terms of information technology.

    They are the first country in Asia to adopt electronic passports and the first country in Asia to set up a dedicated government line network for comprehensive data information transmission, transfer and management.

    This has undoubtedly greatly improved the efficiency of collaborative work among various departments, and more importantly, it has increased the central government¡¯s control over the following states.

    After all, each department must upload all important matters in the system to their respective servers within the specified time and by category.

    This not only makes the official status of the system transparent, but also makes it easier for authorized people to query and pay attention to various information and data through the central network.

    As long as the following units upload registrations in strict accordance with the regulations, there will be very little room for manipulating and playing tricks on their respective work.

    But it may be because networked office is still a new thing, and everyone¡¯s awareness is insufficient. It may also be because the weather here on Falklands is too hot, and people¡¯s brain circuits have undergone strange changes.

    In short, those in power seem to be in a relatively low-level cognitive state regarding the extremely important issue of network security.

    In their impression, network security is nothing more than using genuine systems, updating firewalls in a timely manner, and strict access rights at all levels.

    Even because of the leakage of traffic and security information, a top-secret existence like a genetic laboratory suffered a serious intelligence leak and was attacked.

    But it is only thought to be caused by some old hardware and confusing permission management.

    Therefore, their response is to upgrade some old equipment, and to standardize and weaken the access rights of middle and low-level administrative departments.

    This led to more than two months after the incident, Cai Aalun almost used the same method to break into their comprehensive network again, and entered and exited various system servers at will to steal data.

    It¡¯s like entering a deserted place.

    Even the Security Bureau network, which should pay the most attention to network security, is open to the public.

    At the beginning, Liu Yi even doubted whether it was a trap and someone from the Security Bureau was "fishing".

    ¡° Later, after listening to Yuan Boyun¡¯s explanation, I realized that it was not the people of Falklands who had bad minds, but that the various departments only wanted to shirk responsibility and make money.

    It¡¯s very simple. Of course, the unit that caused the incident will not admit that a major leak of secrets is related to itself.

    But they must provide a reasonable explanation to the central government.

    So, under secret collusion, they unified their voices and shifted the main responsibility to the fact that some office equipment models were old and their safety performance was not up to standard.

    Coupled with the generalization of access rights, this has led to a large number of suspicious people.

    ¡°If we conduct an in-depth investigation, 70% of middle- and low-level civil servants are suspected.  Not to mention how much manpower and material resources are consumed to investigate each one, I am afraid it will cause huge panic.

    Therefore, it is difficult to find the real person responsible.

    And the ages of the big guys above are all there, and they are all veterans and masters in politics.

    But it is indeed a bit difficult to expect them to have sufficient knowledge about "cybersecurity", a new thing that most young people don't understand very well.

    Therefore, after the think tank around them was bribed by the people below, they could only accept the incident investigation report that was submitted.

    As a result, the responsibilities of the relevant responsible persons were not only erased.  Departments can also receive grants to upgrade office equipment and purchase more advanced anti-virus software.

    Needless to say, there are price differences and tricks between computer-related software and hardware, brands and brands, retail and bulk purchases.

    A gluttonous feast involving all departments began.  What was a crisis for some has turned into a blessing for everyone.

    ¡ª¡ª¡ª¡ª

    Liu Yi finally ended his boring hibernation. After several days of monitoring and tracking, he determined that the three groups of investigators who were on duty every day were performing security alert tasks.

    The place where security tasks are performed is an independent small building in the state hospital.

    There are surveillance cameras all around the small building, and medical staff must go through identity verification and registration every time they come in and out.

    ¡°You can often see bad guys or good guys on TV wearing white coats and masks to sneak into the ward.

    But in fact, when the security level is higher, this is complete nonsense.

    The medical staff are all designated, and the people who check and verify are not blind.  Not to mention the registration and verification process, Liu Yi¡¯s Chinese face can¡¯t even pass through the door.What have they done.

    After the three people left in the car, Cai Aalun tracked them at a safe distance with the help of traffic monitoring.

    The result of the tracking was that Nanako Inoguchi sent the other two people to a hotel in Johor Bahru and left in a car.

    Then, Allen Cai hacked into the hotel¡¯s surveillance system and learned that the two lived in rooms 2306 and 2308 respectively.

    He also invaded the backstage of the hotel and obtained the registered names of the two people as Minamino Joji and Stubborn Hidenaka. Among them, Minamino Joji corresponded to Hashimoto Hiroshi.

    Regardless of whether the registered name of the other person is true or false, a scholar who is a celebrity in the industry around the world actually stayed in a hotel under a false name.

    This is undoubtedly a very "interesting" thing.

    Just when Liu Yi was weighing whether to venture into the hotel and wait for an opportunity to investigate, Cai Allen learned through the backstage of the hotel that the two of them had booked a flight to Lengshi the next morning.

    Liu Yi set out immediately after learning about this situation and drove to Lengshi that night.

    After dawn, we rented an inconspicuous car and rushed to the airport before their flight arrived.

    Hearing the announcement of the arrival of the flight from the airport radio, I couldn't help but ask Cai Allen on the other end of the phone: "Are you done? It will be out soon."

    "Right away, right away, five minutesten minutes." Cai Alen's voice sounded in the headphones.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report