
The Enigmatic Space Information Security & Protection System, commonly abbreviated as the E.S.I.S.P.S., is a system developed by the Major Explorer Group.
The Enigmatic Space Information Security & Protection System is a comprehensive, secure and efficient database for anomalous locations to ensure that information of anomalous locations is properly protected, stored, and encrypted between bases to prevent intercepting, in order to support the M.E.G.'s research, exploration, and risk prevention of dangerous anomalies.
During the initial stages of exploration of the Backrooms, the M.E.G. came to the realization that the archives of anomalous locations and data were confronted with the peril of loss, leakage, or malevolent alteration due to the dearth of effective information protection measures. In an attempt to address this pressing issue, the M.E.G. made a resolute decision to invest a considerable amount of resources in the development of a specialized information security and protection system.
After numerous years of painstaking research and repeated experimentation, the first generation of E.S.I.S.P.S. system was unveiled in 1979, which was then referred to as the Documents Protection System (D.P.S.). Despite the fact that the system managed to achieve certain commendable results in data encryption and storage, it still exhibited certain shortcomings in the stability of data transmission and the flexibility of access control.
Two years later, the system fell victim to a hacking attack by a hacker going by the username "Doog", resulting in a large number of files being intercepted. In the wake of this setback, the M.E.G. promptly introduced more advanced encryption algorithms, optimized the transmission protocols, and significantly strengthened the access control measures. Through numerous iterations and upgrades, the E.S.I.S.P.S. has ultimately evolved into a mature and reliable system.
In 2014, the E.S.I.S.P.S. system achieved a momentous breakthrough in the realm of information sharing and collaboration with other related organizations such as the Kauer, the E.R.C., and the B.I.F.. This significant breakthrough not only broadened the scope of application of the system but also laid a solid foundation for cross-organizational research collaboration concerning anomalous locations. Eventually, a portion of the files were uploaded to the database, attaining their current state.
Data Acquisition
The data of E.S.I.S.P.S originates from the administrators of the M.E.G. To begin with, the explorers will undertake an exploration of the anomalous location and meticulously record it in both text and images. Subsequently, the notes are handed over to the administrators. It is these administrators, who possess the system access rights to edit the document, that take on the responsibility of entering the data. They painstakingly organize it into a qualified document and securely save it within the system.
Encryption
The multi-layer, high-strength encryption algorithm is employed to encrypt the input data, thereby constructing an impregnable and unassailable line of defense for the confidentiality of the information. At present, the specific details of this encryption method cannot be disclosed. However, at this juncture, the possibility of attempting to crack any information stored within this system is absolutely nil. There is no chance, not even the greatest hacker, for anyone to succeed in deciphering the data protected by this encryption mechanism.
Secure Transmission
When data is being transmitted between bases, the system continuously monitors and detects the transmission process in real time. It is capable of dynamically adjusting the transmission parameters and strategies at any given moment, based on the specific transmission situation, in order to effectively deal with potential malicious attacks and ensure the security and integrity of the data.
Access Control
Accessing this information demands rigorous authentication and authorization procedures. For instance, to access information related to The First, an Access Level Y is prerequisite. This implies that only Head of Departments, Impresarios, and The First himself are granted the permission to access this information. Through such measures, the M.E.G. effectively guarantee that confidential information remains undisclosed and protected from unauthorized access.
Documents Protection System(D.P.S.)
This is the predecessor of the system. At that time, the system was highly antiquated. Its encryption system was severely underdeveloped, and it had a propensity to collapse frequently. As a direct consequence of these severe shortcomings, it was regrettably abandoned for a considerable period of time.
Anomalous Locations Database(A.L.D)
This system has witnessed a remarkable advancement in its encryption system when compared to the first generation system. The impetus for the development of this generation of systems was the occurrence of hacking incidents. The M.E.G. came to the realization that they urgently needed a more robust and powerful secrecy system. Driven by this realization, this generation of systems was meticulously developed and brought into existence.
Information Query Service Software for Explorers
This special edition of the E.S.I.S.P.S. was specifically developed with the aim of providing convenience to explorers. It enables explorers to access and view the published information on any terminal. Although, in the present day, due to the presence of the comprehensive database, this feature might seem somewhat lacking in practicality and even appear absurd. Nevertheless, at that particular time, it actually created quite a significant commotion and even gave rise to the development of a feature that could subsequently be utilized for sharing information with other organizations.