20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

52<br />

pilots<br />

Pilots are a special type of OS with more autonomous decision-making<br />

ability, used in agents and drones. Unlike operating<br />

systems or most other programs, Pilots are capable of operating<br />

independently and maneuvering through the Matrix on their own;<br />

see Autonomous Programs, p. 110. Like an OS, Pilots may also be<br />

programmed with sets of commands; see Agent Scripts, p. 100.<br />

Drone Pilots are also customized for the specific device they are<br />

made for (see Pilot Capabilities, p. 103, Arsenal).<br />

prograMS<br />

Programs are the tools of the Matrix. Every time something<br />

is done, a program is involved. Sometimes only a very small<br />

program is needed, and those instances are not covered by the<br />

rules—but it’s still a program doing the work. Programs are always<br />

run by nodes. The maximum number of programs a node<br />

can handle is called its processor limit, while the number it is actually<br />

running is the processor load. If the processor load exceeds<br />

the processor limit, the node is subject to Response degradation<br />

(see Matrix Attributes, p. 212, SR4). Programs do not have to be<br />

run by the persona’s node to be used by a persona. It is possible<br />

to use programs run on the remote node a persona is accessing.<br />

The remotely used program then counts towards the processor<br />

load of the remote node instead of the node running the persona.<br />

Public nexi like libraries, archives, and data havens often provide<br />

remote browse programs.<br />

protocoLS<br />

Every time a node interacts with another node, predefined<br />

Matrix protocols are invoked. The receiving node looks at account<br />

data, access rights, and status of the connection and then decides<br />

whether a request will be accepted or not. By using hacking tools,<br />

hackers try to circumvent or exploit these protocols to again access<br />

rights, crash other icons, or do things not allowed by their current<br />

account privileges.<br />

accoUntS<br />

Access rights on nodes are governed by accounts. Every subscription<br />

and data request (see Data Requests, p. 54) is assigned<br />

certain privileges, depending on the account information that<br />

was sent with the request, or with the initial login in the case of<br />

subscriptions (see Subscriptions, p. 55). There are various flavors<br />

of accounts, depending on the status of the connection and what<br />

kind of information was sent.<br />

Standard accounts<br />

In the case of a standard account, the login data consists of<br />

a username and a password of arbitrary size. This information is<br />

always encrypted by the operating system, with a Rating of 6, upon<br />

sending. The password can be an alphanumeric string, a biometric<br />

pattern, or a signature produced by a passkey (see Passkeys, p. 64).<br />

The password is then compared to either the node’s internal user<br />

database or other sources (see Web of Trust, p. 64) and either confirmed<br />

or rejected. Most users store their passwords or signatures<br />

in encrypted files on their commlink, as they are normally too<br />

long and complex to remember. Biometric signatures can be read<br />

directly from the user with the help of various types of scanners.<br />

node accounts<br />

Node accounts grant access rights on nodes depending on<br />

the privileges a user has on another node it is linked to at that moment.<br />

User access on a security node, for example, might include<br />

a user account, and thus user rights, on the various cameras and<br />

sensors the security node is connected to. A spider working in the<br />

security node is then able to access all the sensors without having<br />

to provide the entire username and password data for the various<br />

sensor devices. The security node sends this information for him,<br />

and the spider can simply access the devices and control them. Or<br />

he could just read out their sensor feed as long as he is logged into<br />

the security node with the appropriate access rights.<br />

access id accounts<br />

Access rights can also be granted by access ID. This means<br />

that every time a node or construct with a certain access ID is accessing<br />

a node, it is automatically granted the access rights related<br />

to the ID. Just like standard accounts, the node compares the access<br />

ID with its internal user database and grants the appropriate<br />

rights upon initial login. A hacker can abuse this by spoofing his<br />

access ID (see The Datatrail, p. 216, SR4) and thus forcing the<br />

node to automatically assign the related rights to the hacker.<br />

accoUnt priviLegeS<br />

Access rights tell the node what the user of an account can<br />

or cannot do. In principle the administrator of a node sets the<br />

privileges related to certain accounts. Most nodes, however, tend<br />

to have the same categories of access rights. There are four levels<br />

of access rights: User, Security, Admin (see Account Privileges, p.<br />

216, SR4), and Public.<br />

public access rights<br />

If a connection is established without sending any information<br />

except the access ID, the connection is automatically granted<br />

public access rights. This is the type of access a user receives when<br />

she is entering the public part of a node. The public account allows<br />

access to public data like website information, blogs, databases,<br />

personal profiles, and so on. Depending on the accessed data,<br />

different access rights might come with the public account, for example<br />

the ability to write without a username in public forums.<br />

User access rights<br />

The vast majority of accounts on a standard Matrix node are<br />

user accounts. The most important privilege normally granted<br />

via user access is one slot on the subscription list. This allows the<br />

user, or any of his agents, to enter the node in VR or AR mode.<br />

Most other rights vary from node to node and from account to<br />

account. Depending on the purpose of the account, User accounts<br />

grant access to file indexes, files, the ability to edit files, command<br />

devices controlled by a node, upload data, common-use programs,<br />

and so on.<br />

Security access rights<br />

Security access rights are mostly given to those who need more<br />

control over parts of a system without managing the entire system.<br />

This level is often granted to spiders, privileged users, and IC. They<br />

are allowed to view log files and node statistics and can alter general<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!