Challenge 736 - Wide open
Nov. 27th, 2022 09:12 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Title: Wide open
Character: Jack, Tosh
Author: m_findlow
Rating: PG
Author: m_findlow
Rating: PG
Length: 200 words
Content notes: none
Author notes: Written for Challenge 736 - Secure at
torchwood100
![[community profile]](https://www.dreamwidth.org/img/silk/identity/community.png)
Summary: Tosh decides to be blunt about Torchwood's security. A double drabble.
'These systems aren't very secure,' Tosh reported, hoping she wasn't about to upset her new boss.
Jack arched an eyebrow at her, curiosity more than indignation clear from his expression. 'How so?' There was a genuine interest in the answer, judging by his intonation, which filled Tosh with a sense of relief that what she was about to say would be taken seriously.
'Well, it's not to say that they aren't secure at all,’ she began.' A teenager in their bedroom couldn't get access, for example, but if we were dealing with a sophisticated agent, or say, another organisation with a team of computing experts and some decent hardware, well, there's nothing to suggest that they couldn't insert some malicious programming, or even just install a back-door to extract data.'
'That's how you found the plans for the sonic modulator. Those terrorists set you the task of finding something valuable and you used a back-door trawl their systems.' She flushed with embarrassment. He reached out a hand. 'Hey, not your fault. They had your mother hostage. But… it takes a thief to be able to stop one. Do what you need to do to make this place a digital fortress.'
'These systems aren't very secure,' Tosh reported, hoping she wasn't about to upset her new boss.
Jack arched an eyebrow at her, curiosity more than indignation clear from his expression. 'How so?' There was a genuine interest in the answer, judging by his intonation, which filled Tosh with a sense of relief that what she was about to say would be taken seriously.
'Well, it's not to say that they aren't secure at all,’ she began.' A teenager in their bedroom couldn't get access, for example, but if we were dealing with a sophisticated agent, or say, another organisation with a team of computing experts and some decent hardware, well, there's nothing to suggest that they couldn't insert some malicious programming, or even just install a back-door to extract data.'
'That's how you found the plans for the sonic modulator. Those terrorists set you the task of finding something valuable and you used a back-door trawl their systems.' She flushed with embarrassment. He reached out a hand. 'Hey, not your fault. They had your mother hostage. But… it takes a thief to be able to stop one. Do what you need to do to make this place a digital fortress.'
no subject
Date: 2022-11-27 10:51 am (UTC)no subject
Date: 2022-12-01 06:50 am (UTC)