20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SaMpLe nodeS (cont.) . . . . . . . SecUritY Scripting . . . . . . . . . . . . . .<br />

advanced prograMMing taBLe<br />

Software Threshold Interval<br />

Agent/IC/Pilot Rating x 3 3 months<br />

AR Environment 12 1 month<br />

Autosofts Rating x 2 6 months<br />

Common Use Programs Rating 1 month<br />

<strong>Firewall</strong> Rating x 2 3 months<br />

Hacking Programs Rating x 2 1 month<br />

Sensor Rating x 2 1 month<br />

System Rating x 2 6 months<br />

Tactical Rating x 3 6 months<br />

Program Options<br />

General Rating* 1 month<br />

Biofeedback Rating x 2 1 month<br />

Psychotropic Rating x 3 3 months<br />

Hacking Rating* 1 month<br />

Malware<br />

Bugs (adding) 4 1 hour<br />

Bugs (finding/repairing) 12† 1 week<br />

Virus Rating x 4 3 months<br />

Metamorphic Engine +6 +1 month<br />

Trojan Rating x 4 3 months<br />

* Options without a rating are considered Rating 3 for<br />

Threshold purposes.<br />

† Subject to gamemaster discretion. If the bug is intentionally<br />

added, threshold = net hits x 4.<br />

Unwired<br />

Scripting<br />

A script can take the form of an actual script, a list<br />

of conditions and actions that the IC runs through when<br />

acting. For example, a script for the MCT Bloodhound<br />

might look like this:<br />

1. Is there an active <strong>alert</strong>?<br />

a. If yes, then go to 2.<br />

b. If no, then go to 5.<br />

2. Has the intruder already been Tracked successfully?<br />

a. If yes, then stand down.<br />

b. If no, then go to 3.<br />

3. Perform a Track on the intruder. Go to 4.<br />

4. Does the Track finish successfully?<br />

a. If yes, notify spider of intruder’s location and access<br />

ID. End action for this Initiative Pass.<br />

b. If no, end action for this Initiative Pass.<br />

5. Perform Matrix Perception Test on the icon that has<br />

been Analyzed least recently. Go to 6.<br />

6. Is the Analyzed icon an intruder?<br />

a. If yes, initiate an active <strong>alert</strong> and End action for<br />

this Initiative Pass.<br />

b. If no, end action for this Initiative Pass.<br />

This format is longer and more involved than a brief<br />

description, but reflects the IC’s limited decision-making<br />

abilities. When using this method of scripting, remember<br />

to make sure that every numbered entry can be<br />

reached from another (except the first, which is where<br />

the IC starts), and that every entry either leads to another<br />

entry or ends the IC’s turn in the Initiative Pass.<br />

Forgery Table<br />

Forgery Threshold Interval<br />

Fake Corpscrip (Rating x 20) 1 day<br />

Fake Game Credits (Rating x 16) 1 hour<br />

Fake License (Rating x 16) 1 hour<br />

Fake National Currency (Rating x 18) 1 day<br />

Fake Nuyen (Rating x 24) 1 day<br />

Fake SIN (Rating x 32) 1 week<br />

PAYDATA STREET COSTS<br />

Situation Cost Adjustment<br />

Data is damaged, but mostly salvageable –20% to –50%<br />

Data is only available on an obsolete medium –20%<br />

Data is publicly available but obscure –10%<br />

Data is in a Proprietary File Format +10%<br />

Certified data +50%<br />

Sole remaining copy of data +100%<br />

Unique enchantment formula +200%<br />

Nanoschematics +400%<br />

Spirit formula +400%<br />

205<br />

Simon Wentworth (order #1132857) 9<br />

tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!