typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1618 refuses to participate, wait and see!

In the peaceful environment of the new century, cyber war without the smoke and flames of war is even more cruel than traditional war!

It is true that cyber war does not cause serious and realistic harm. In other words, cyber war will not cause large-scale casualties, nor will it cause large-scale destruction of buildings, nor will it cause tragic killings.︾£,ww

※w.2♀3wx.co⌒m

However, the impact of cyber war is definitely not inferior to that of traditional war! Especially large-scale and ultra-high-end hacker wars have caused huge turbulence in the Internet world and caused huge harm.

If there is no organized protection in the Internet world in the North Ossetia region, and hackers from the US invade directly, what will be the consequences?

First of all, hackers from Lijian will capture the official government website of the North Ossetia Autonomous Prefecture and tamper with the government's official website. This may seem to have no practical effect, but it will humiliate the face of the North Ossetia Autonomous Prefecture government, which is of great significance.

The second step of the Li Jianguo hackers will no longer be filled with any "warmth". They will only target an official government website, but will choose key targets.

Usually, the second target is basically the voice communication network, live TV network, and urban power supply network. Regardless of any of these three, it is a very bad situation for the officials of the North Ossetia Autonomous Prefecture!

How bad would it be if the voice communication network was controlled and people could not communicate via telephone? Perhaps humans who have never used telephones will never be able to imagine the panic of modern humans losing telephone communication.

But that’s the truth!

Once human beings in a civilized society find that neither mobile phones nor wired telephones can make calls, and this happens on a large scale, human beings will develop fear and even trigger large-scale riots among the people.

The live TV network is controlled, which is not a good outcome!

Perhaps, based on a simple analysis, the impact caused by the control of the live TV network will not exceed the disaster caused by the control of the voice communication network.

But in fact, after the live TV network is controlled, it will also be very tragic! If a hacker who controls the live TV network plays some weird videos through the live TV network, it will definitely cause great harm.

Don't get me wrong!

The so-called weird videos are definitely not romantic action art films, but videos that can cause people to panic. For example, it was announced that North Ossetia has been completely occupied, and people should stay at home to ensure safety.

When such a video is broadcast, even if the live TV network is forcibly and physically cut off, it cannot stop the panic that arises among the people.

As for the consequences after the city power grid system is hacked, what will be the consequences? Even Shuangqing City, which has very strict urban defenses, met a rather tragic end after the city power grid was attacked and the power was cut off. Shi Lei's home base was also destroyed.

People blow up!

After Lijian hackers have completed the control of the three targets in the second step, their next goal is even more terrifying. They will try to attack the financial network in North Ossetia.

Although the financial network has an independent network architecture and even information rules, these are not problems for powerful hackers.

Once the financial network is breached by hackers and cannot be restored in a short period of time, what will be the impact? The answer is terrifying!

Think about the one million yuan deposited in the bank, just because of a hacker attack. After the bank's data is lost, what will happen to the depositors' losses?

Is it possible that if a depositor says he has one million deposits, then he has one million deposits? Before the data is restored, how to judge the amount of deposits of depositors is a big problem!

The financial network is almost the most sacrosanct area in the network. However, the sacrosanct financial network has to communicate with the Internet due to user reasons and cannot form a stable closed internal network. If you want to invade the financial network

The Internet is not impossible, it is even very easy.

Hackers with a little bit of ability can touch the financial network. After all, any bank provides online banking services. Through online banking services, it is too easy for a skilled hacker to touch the financial network.

But the financial network is so sacrosanct!

Even a hacker who invades an intelligence agency may be let go by the intelligence agency because he has not touched the core content. But if he touches the network of the financial system, it is a restricted area in the hacker world, and he will definitely be tracked and investigated endlessly!

It is precisely because of the sanctity of financial networks that most hackers are insensitive to financial networks and will not conduct any intrusion attacks against financial networks.

But hackers from Lijian Country don’t have so many scruples!

With the permission of the three major intelligence organizations of the Li Jian Kingdom, who knows how crazy the hackers of the Li Jian Kingdom would do?

Just thinking about it, you know they will never do anything good!

Fortunately, the network security in the North Ossetia region is not without defense, but has many defenses. Not only the organization is paying attention to it all the time, but also the network security department of Soviet Russia is also paying attention to the situation at all times.

"Stone, the Soviet Union's FSC intervened in the war." Raphael typed on the laptop keyboard while reporting information to Shi Lei.

Shi Lei was also typing on the laptop's keyboard. A large amount of data information was displayed on the laptop screen. Although the lip lens information processor can replace most of the notebook's work, even in terms of portability and battery life, the lip lens information processor

The advantage is much greater than that of laptop computers.

At the same time, due to the remote processing tasks, the computing performance of the lip lens information processor is very outstanding, almost equivalent to the clone of iwn secret network and super computing lightning.

But a laptop is still an essential tool!

Because when inputting relevant source code, the input speed using a laptop keyboard far exceeds the input speed of a virtual keyboard. After all, the key travel feedback of a physical keyboard is a problem for any hacker or programmer.

These are the best ways to confirm information.

"Well, you see, they are protecting North Ossetia's financial network? Humph! Doesn't it seem like they don't care about the security of other networks in North Ossetia?" Shi Lei snorted coldly.

Raphael also didn't understand: "I don't know yet, maybe they will send more security technical experts."

Shi Lei retorted, "It's impossible. You don't know the style of Soviet Russia. Since they protect the financial network, it means they don't care about the problems of other networks."

"Why?" Raphael still didn't understand the reason. The Soviet Union's FSC Federal Security Service was very powerful, even comparable to the NSA National Security Agency. In other words, the FSC Federal Security Service had the power to protect North Ossetia's network security, but

Just don't do that.

"Politicians!" Shi Lei said with some disdain, "Isn't it to make the North Ossetia Autonomous Prefecture government further rely on them, Soviet Russia? But, do they need to do this?"

The people of North Ossetia are very interested in joining the Soviet Union! If the people of North Ossetia were to hold a referendum and choose to merge North Ossetia into the Soviet Union, then the number of citizens who would agree would definitely exceed 100%.

Fifty.

Raphael sighed, "Stone, what should we do now? Help North Ossetia? Or wait and see what happens?"

Shi Lei is the dark representative of Xia Kingdom, which means that Shi Lei's position represents the position of Xia Kingdom.

Why did Shi Lei join this war?

It wasn't that Shi Lei was kind-hearted and couldn't bear to see the people in North Ossetia suffer, but because the Soviet Union was an ally of the Xia State, and the Xia State needed to support the Soviet Union, so they chose Shi Lei.

Now, after the Soviet Union's position was made clear, Shi Lei needed to make his own choice.

Raphael is not an idiot who doesn't understand anything. If Raphael was that kind of idiot, how could he reach the heights of the world's top hacker?

Any top hacker in the world is not a simple person!

Raphael also understood the position of representative Shi Lei, so he wanted to ask Shi Lei what they should do next. Should they help the North Ossetia Autonomous Prefecture government fight against the hackers of Li Jian? Or should they wait and see what happens and wait for the Soviet Union to do something good?

The fsc Federal Security Service solves the problem.

On behalf of the Xia Kingdom, Shi Lei only provided a certain degree of assistance for the actual security of the North Ossetia region, and network security was not within the scope of Shi Lei's obligations.

Shi Lei thought about it and finally shook his head, "We're in for a good show! But inform our peripheral members to be ready to intervene in the war anytime and anywhere! Although our allies want to give the North Ossetia Autonomous Prefecture government a warning, but if the price of warning is too high,

That is not in our interests. So, if necessary, we need to intervene in this cyber war!"

This time the war is no longer simply a contest between countries. It is also a contest between Black Watch and the Angel Council!

"Okay, I understand!" Raphael nodded, and then quickly typed commands on his laptop, instructing Yizuer to notify all peripheral members of the organization.

After all peripheral members of the organization received the order, one of them or an ordinary member passed on the order of the organization through secret communication channels.

Thomson David of the National Security Bureau of the National Security Agency received the transmitted information and found out that the ordinary-level member was the spy planted within the organization by Thomson David.

Thomson David quickly reported the situation of the organization. When the National Security Agency of the National Security Agency learned that the organization would not intervene in the hacker attack of the United States for the time being, it immediately made a decision...

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next