Quite apart from the nonsensical code and "bots" that Daewon is purportedly using, Izzy's hardware is in a series of racks, physically cabled together. Not only is WiFi implausible as a means of connecting servers together and providing a backdoor into Izzy's network, but no practical amount of WiFi nodes could provide the transfer speeds necessary between servers.
Any computing graduate of any University or college in the last thirty years would implicitly understand the need to have multi-factor authentication and encryption, and would do everything to ensure that computer and network hardware cannot be physically accessed by unauthorized persons, and yet Izzy has a lackadaisical approach to electronic and physical security. The comical ease with which Daewon accesses Izzy's system is at odds with the fundamental skills of any IT professional.