Chereads / Legend of the Cyber Heroes / Chapter 160 - 80 sneak in

Chapter 160 - 80 sneak in

"What's the hardest cyber attack to defend against? It's when you walk into the target's office, find a terminal in use, find an excuse to send its operator away, then plug a USB drive into the computer and proceed with authorized operations. Unless the other party is willing to decrease work efficiency, every step requires identity verification. Otherwise, no security system can withstand such an approach."

"Other hacking methods are just inferior substitutes that arise because one cannot perform such direct actions for various reasons."

These were words someone once said to Xiang Shan in the past.

In some sense, the bureaucratic system, often criticized as 'inefficient' due to its multilayered authorization protocol, is essentially this approach's baseline. Within the organization, every step of any operation requires specialized authorization and verification to ensure there are no deviations in conduct.

This is the end of Part One, download Chereads app to continue:

DOWNLOAD APP FOR FREEVIEW OTHER BOOKS