Home Categories political economy Currency Wars 3: The Financial High Frontier

Chapter 94 Infrastructure hidden dangers in the financial high frontier

In the contemporary society with highly developed computer technology, financial activities are increasingly dependent on electronic information and network technology.There are still a lot of security risks hidden in this core financial infrastructure. The current technology is enough to remotely activate the power supply of the mobile phone and eavesdrop on it through the mobile phone when the mobile phone is turned off; when the CIA reads the hard disk data through the computer CPU, the weak electromagnetic waves emitted by the computer CPU can be intercepted and intercepted in a non-contact manner several meters away. Steal computer data.In such a highly insecure electronic society, China's financial system is quite indifferent to potential security threats.

At present, almost all financial institutions in China use foreign host hardware systems and operating system software. In terms of core data storage, most of them use foreign database software. Even if all applications are developed independently, it is still far from enough to ensure financial security. Data Security.It is no news that Microsoft has a secret door in the operating system. What does the United States show surprising sensitivity to Lenovo's acquisition of IBM laptops?When national security has repeatedly become a key obstacle to China's acquisition of American companies, people may just regard these claims as hype by the news media or an excuse for trade protection, without seriously thinking about the reasons behind them.

It is technically feasible to open the back door in the host hardware system, and it may be remotely activated or shut down in emergency and special situations.In terms of host operating system software, it can even flex its muscles. Due to the confidentiality of source programs, it is impossible for users of domestic financial institutions to know the various "small programs" that may exist in the operating programs at the bottom of the system.The problem is even bigger with the database, where all the key information is stored, such as the amount of deposits in the customer's bank account.In the source program of database software, some sleeping "Trojan horses" can be implanted without anyone knowing.

If an irresistible major event occurs one day, these sleeping "trojan horses" and closed secret doors may wake up and open one after another.Some programs may suddenly "go crazy" and delete the deposit data in all bank accounts. The programs may not be able to distinguish whether these accounts belong to the military or civilians, whether they are commercial or personal, whether they are government or institutions.When the army is about to send out planes, tanks or cars, it suddenly finds that the money in the account has disappeared and cannot pay for the operation of the military machine; when ordinary people wake up overnight and go to the bank to withdraw money, they are told that there is no money in the account; But the check was bounced; when the government paid the salary, it was unable to transfer money to the card of the civil servant.Can people imagine how to deal with all kinds of emergencies in such a paralyzed financial system?

When the financial institution urgently activated the backup system, it was discovered that the backup system used the same hardware, the same software, and the same database, and eventually even the faults were the same. Be prepared for danger in times of peace, and always put your own fences firmly first. Financial security is by no means empty words.Hidden dangers should be eliminated first before they occur.
Press "Left Key ←" to return to the previous chapter; Press "Right Key →" to enter the next chapter; Press "Space Bar" to scroll down.
Chapters
Chapters
Setting
Setting
Add
Return
Book