The tea plants he had given to the workers were refined and sold back to him. He wanted the labourers to use the plants for themselves or sell them at a good price by themselves, but they all sold it to him at a very low price.
Although he initially refused, seeing their eagerness to sell, he could only helplessly buy the tea from them.
And thus, he had now acquired a huge supply of tea leaves, enough to last for a whole year.
Evan stayed back to oversee things a bit.
He didn't want to dump everything on Ryan right away. Though the loyalty contract mitigated the concerns about any kind of betrayal, Evan still needed to make sure that Ryan could do the work properly.
Also, not to forget, he was the only who had full knowledge of cultivation of Spirit Vitalizing Tea.
As anticipated, Ryan was troubled by the sudden job change as he struggled to cope up with it, and if Evan had to rate him on a scale of ten, it would be a 6 if he was being generous, otherwise, honestly, it was a 4.
However...
Being a detective, and having good observation skills, Ryan's growth was quite noticeable to Evan.
Ryan absorbed knowledge in no time and got acknowledgement from the labourers and the people around him.
Evan brought a few trucks and drivers for transportation purposes, thinking that since he was there, it was better to finish all the small tasks.
Who knew that instead of delivering the product to the said destination, the driver in charge of transporting the tea later would send it somewhere else?
And what if the driver put a few illegal substances and his things were to get seized by the authorities, creating more problems?
Evan was slowly getting the hang of high society, where tricks like these were common.
Just throw some money and get the job done.
Wickedness and treachery knew no bounds when it came to human greed.
While going through all of this, Evan wasn't just daydreaming and spending his days idly like a sloth.
In the meantime, he worked on his programming skills and came up with another app.
He introduced another preliminary code, and developed an entirely different software model of Tracking Mechanisms:
–IP Address Monitoring...
Breach Protector would monitor IP addresses accessing the firewall system and track incoming and outgoing connections to detect suspicious activities or unauthorized access attempts
______
[If you are not aware of the meaning, here is a short summary.]
Denial-of-Service (DoS) Detection: Utilizes anomaly detection techniques to identify and mitigate DoS attacks. It monitors traffic patterns and behaviour to distinguish between legitimate and malicious traffic, ensuring continuous availability of services.
Behavioural Analysis: Analyzes patterns of data access and transmission to detect deviations from normal behaviour. This helps in identifying potential insider threats or external attacks attempting to exploit vulnerabilities in the firewall system.
Real-time Alerts: Generates immediate alerts and notifications upon detecting suspicious activities or breaches. Alerts are sent to system administrators or designated personnel for prompt investigation and response.
Breach Protector: Secure Firewall Management and Data Monitoring Application
AES (Advanced Encryption Standard): A widely-used encryption algorithm capable of securely encrypting sensitive data to prevent unauthorized access.
Deep Packet Inspection (DPI): A method used to inspect and analyze the contents of data packets as they pass through a network firewall, enabling detailed inspection and filtering based on packet content.
Behavioral Analysis: The process of analyzing patterns of data access and transmission to detect deviations from normal behavior, which may indicate potential security threats or anomalies.
Real-time Alerts: Immediate notifications are generated by a security system or application to alert administrators or users about potential security incidents or suspicious activities as they occur.
Tracking and Auditing: Definition:** Monitoring and recording activities within a system or network to create an audit trail. This helps maintain accountability, detect security breaches, and facilitate forensic investigations.
IP Geolocation: The technique of determining the geographic location of a device or IP address connected to the internet. It uses databases or services that map IP addresses to specific geographic locations.
SIEM (Security Information and Event Management): A technology solution that aggregates and analyzes security event data from various sources across a network to provide actionable insights, detect threats, and facilitate incident response.
Data Leakage Prevention (DLP): Techniques and tools designed to prevent sensitive data from being transmitted outside of a network perimeter without authorization, thereby protecting against data breaches.
Intrusion Detection System (IDS): A security system that monitors network traffic for suspicious activities or policy violations. It generates alerts when potential security threats or unauthorized access attempts are detected.
Intrusion Prevention System (IPS): An advanced security technology that not only detects suspicious activities or policy violations but also actively blocks or prevents them from occurring within a network or system.