Security team leader: "You can imagine advanced viruses. Hackers create advanced viruses simply to increase their attack methods on system vulnerabilities."

"For example, this gladiator named Virus could only do frontal thrusts at first, but later he learned to chop, pick, and sweep. He learned various combat steps and flexible movements, and his attack methods became more and more abundant."

"And every time we upgrade the firewall, we are preparing defense measures against these attacks in advance - it can also be said that we are fixing system vulnerabilities in advance."

"As long as the attack methods of the virus are within the preset range of the firewall and no loopholes are found, the computer cannot be broken into."

“This is the most popular principle of information security attack and defense.”

Schenkov: "Then what is going on with the virus we are facing now?"

The security team leader adjusted his glasses and couldn't help but swallowed: "Our current codename for this virus is 'Nemesis'. "

"After tracing its origin, the Nemesis virus has been lurking in major networks in Crescent City two or three years ago, and has been spreading in an extremely covert manner."

"This is also the reason why the virus outbreak was so sudden. Because except for some new devices, Nemesis was already everywhere, but we didn't find it."

"The biggest characteristic of the Nemesis virus is that it can control the infected device and use all means to attack specific targets."

"So this is why we see very strange scenes - some people are not harmed even if they are at the center of the attack. And some people hiding at home will be killed by smart devices using various means."

"This is a targeted virus, and its purpose of existence is to kill all marked life forms!"

Schenkov asked quickly, "Is there any way to know Nemesis's marked list? That way we can take protective measures in advance!"

The security team leader shook his head: "There is no way. This is something in the other party's hacker database terminal, and we can't find it."

Schenkov was pacing back and forth anxiously: "Now that you know how this virus works, you should quickly upgrade the firewall! Can't we just close the loopholes?"

The security team leader pursed his lips and his eyes were extremely complex: "No such simple and ordinary means of repairing system vulnerabilities are only effective against viruses with conventional algorithms."

"But this Nemesis virus uses an "evolutionary algorithm." "

"The scary thing about evolutionary algorithms is that it is no longer a rigid virus program that only executes attack methods pre-inputted by hackers. Instead, it is adaptive and self-learning, and evolves independently all the time."

"If one attack method doesn't work, it will evolve a second method. If the second method doesn't work, a third or fourth method will evolve."

"The evolutionary algorithm virus is like a genius warrior. It will learn from continuous failures, summarize and summarize its experience, and continue to evolve until it finds a way to break through system vulnerabilities."

Schenkov said quickly: "Then use the stupidest method to plug all the system loopholes, isn't that enough?"

It can be vaguely seen that the safety specialists present curled up their lips and shook their heads helplessly, as if they were laughing at the technical ignorance revealed by these words.

The security team leader lowered his head and looked very sad: "Mr. Schenkov, let me ask you a question. If we want to plug system loopholes in all directions, how many directions do you think there are in a horizontal plane?"

Without thinking, Schenkov said: "The degree of a circle on the horizontal plane is 360 degrees, so there are 360 ​​directions."

But soon, he frowned again: "No. We have to consider the accuracy issue. If the decimal point is moved back one place, it will be 3600, and if it is moved two places, it will be 36000. If it is moved all the way back,"

Suddenly, he got a chilling answer: "Infinite?"

The security team leader lowered his eyes and said quietly: "Yes, unlimited. The attack directions of the virus are unlimited, and the defensive directions that the firewall needs to be built are also unlimited."

"The kind you are talking about, building an absolute defense that covers all vulnerabilities, that is something only God can do."

Schenkov said with a face full of astonishment: "You mean, no matter how we upgrade the firewall, the Nemesis virus will definitely find a way to break through the loopholes from infinite possibilities?"

Security team leader: "That's what it means."

Schenkov was so angry that he yelled: "What about you? What do you do for a living? What kind of evolutionary algorithm can a wild hacker do, but you can't do it? Can't you use evolutionary algorithms to build firewalls?"

The security team leader quickly explained: "The specialists present are all top information technology talents, and they are all familiar with evolutionary algorithms. In fact, our firewall is built with evolutionary algorithms, and they are constantly patching system vulnerabilities in unlimited directions."

"But" when he said this, his face became extremely ugly, "The effect of evolutionary algorithms also depends on the computing speed."

"The code we built is not as fast as the Nemesis virus."

"Our firewall has evolved 1 defense measures, and the Nemesis virus has evolved 10 attack methods."

"By the time we have evolved 10 defense measures, it has evolved 100 million attack methods."

"Our evolutionary algorithm lags behind the opponent's speed and will always be one step slower."

"That's why I said that this hacker is a genius I have never seen before, and his technical attainments are really amazing."

Schenkov's eyes darkened and he felt his blood pressure rising: "So you want to tell me that dozens of you, the best security specialists of the Crescent City authorities with high salaries, were killed by a wild hacker who came from nowhere? Are you done?"

All the security officers present lowered their heads in shame.

The security team leader tried to save face and stammered: "The other party could also be a team of hackers! It doesn't have to be an individual! Yes, it must not be an individual, otherwise"

Schenkov signaled to stop and said coldly: "Don't make excuses here. Plan, I want a solution."

The security team leader said tentatively: "If the hacker himself can be caught, there will definitely be a solution."

After hearing this, Schenkov cursed angrily: "We don't even have a target. Where can I catch him? It doesn't hurt to stand and talk! The Alpha team is outside the building. I'll give you the command. You can catch one for me." ?!”

The security team leader shrank his head and said with wandering eyes: "If we can't catch the hacker, we can only send the virus source code sample to the capital and let the information security team there help analyze it. They have better technical conditions and may be able to provide solution."

Schenkov was silent for a moment and asked a crucial question: "But before that."

"Before that." The security team leader seemed to have thought of something terrible, and his face turned pale. "Before that, the Nemesis virus will continue to run."

"It will hunt the preset targets endlessly, keep killing, keep killing, until those people shed their last drop of blood."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like