20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

62<br />

A chain is only as strong as its weakest link. This goes doubly for<br />

computer systems, which can be attacked at three points: the physical<br />

device, the virtual node, and the legitimate user. A hacker only needs<br />

to find a single chink in the armor to completely take over a system.<br />

This chapter discusses principles and practices by which a system can<br />

be secured, from the lowliest PAN to the greatest nexus.<br />

pHYSicaL SecUritY<br />

An attacker that can reach the physical device of a system has<br />

more power over that device than a hacker trying to reach it via<br />

the Matrix. Keeping an attacker out is more than just guards and<br />

cameras. There are a number of physical practices that a facility can<br />

use to help bolster its Matrix defenses.<br />

pHYSicaL faciLitieS<br />

The physical security of a facility is necessary to protect the<br />

integrity of any Matrix system housed there. Most physical security<br />

can be handled by established techniques (Security Systems,<br />

p. 251, SR4). There are more specific measures that can be taken<br />

with regard to Matrix security.<br />

Landscaping for Signal attenuation<br />

When all of your devices are wireless, it is important to take<br />

steps to keep the signal from leaking too far from a controlled area.<br />

Proper landscaping can create greater attenuation, or signal loss,<br />

than would otherwise be present. Hills and other earthen features<br />

usually contain compounds of iron or other metals, which cause<br />

attenuation and reduce effective Signal ratings by 2 to 5 per meter<br />

of thickness, depending on metallic content.<br />

Water also causes rapid attenuation, especially salt water.<br />

Every 10 cm of fresh water and every 1 cm of salt water reduces<br />

the effective Signal of a device by 1. Flora also reduces the effective<br />

Signal of devices, mostly because of the water held in plants. For<br />

every ten meters of foliage or five meters of dense foliage, reduce<br />

Signal ratings by 1.<br />

wireless negation<br />

Wireless negation (p. 256, SR4) is a highly useful tool that<br />

absorbs some of the wireless signals coming from either side of<br />

the surface it covers. It is available as both wallpaper and paint in<br />

several different colors and textures, all with a dull, dead look that<br />

is despised by decorators and artists.<br />

Faraday cages are a more extreme form of wireless negation. A<br />

Faraday cage is an enclosed structure made entirely of a conductive<br />

material, usually metal. The walls of a Faraday cage may be solid or<br />

take the form of a narrow mesh. When the cage is closed and electromagnetic<br />

waves hit the outside (or inside) of the cage, the energy from<br />

the wave is dispersed across the surface of the outside (or inside) of the<br />

cage. In practical terms, a Faraday cage prevents wireless signals and<br />

other electromagnetic waves (as from HERF guns or EMP effects)<br />

from penetrating either from the outside or the inside.<br />

telematics infrastructure<br />

Telematics Infrastructure (TI, pronounced “tie”) is a tracking<br />

system for vehicles, drones, and personnel. It works via a network<br />

of TI programs running on individual commlinks, devices, and<br />

even RFID tags. It combines sensor data, GPS information, and<br />

wireless scanning to detect and track all individuals within its<br />

boundaries and report anomalies.<br />

TI will automatically detect and report any wireless device<br />

in Active or Passive mode that enters its coverage area. Various<br />

parts of the network also scan for Hidden nodes; use the rules<br />

for Detecting Wireless Nodes as an Extended Test (p. 225, SR4)<br />

except that the TI system makes only (Rating) rolls per minute<br />

and scans its entire coverage area.<br />

The information generated by the TI network can be fed to<br />

a TacNet (p. 125) or any other user or device that is “TI’d into<br />

the system.” This information includes the position, direction, and<br />

speed of any wireless device within the coverage area, along with<br />

its access ID and any public data offered by the device.<br />

acceSSiBiLitY<br />

Another way to keep a system secure is to simply keep people<br />

from getting to it. This is more difficult in a wireless world, especially<br />

when more and more people are finding the thought of<br />

office professionals with datajacks in their heads to be quaint. Still,<br />

there are effective ways to increase security without losing utility.<br />

cabling<br />

One of the ways to escape the hazards of wireless networking<br />

is to take the wireless out of the network. Devices that have their<br />

wireless capability disabled can be connected via fiber optic cables.<br />

These cables have the advantage of being invulnerable to wireless<br />

attack, although it removes the ability to move devices or to easily<br />

replace them.<br />

Another consideration is the ubiquity of wireless among<br />

the users of a facility. Employees, customers, soldiers, and other<br />

personnel will very likely have their own commlinks, and expect<br />

to work with the system via wireless AR or VR. Training personnel<br />

that expect to be able to walk into a room and use its systems<br />

Wireless Negation Availability Cost<br />

Wireless Negating Paint, per can (30 m2 coverage) Rating Rating x 20¥<br />

Wireless Negating Wallpaper, per 10 m2 strip Rating Rating x 5¥<br />

Faraday Cage, per m3 4 100¥<br />

Telematics Infrastructure Software Availability Cost<br />

Telematics Infrastructure (Rating 1–3) (Rating x 2)R Rating x 400¥<br />

Telematics Infrastructure (Rating 4–6) (Rating x 2)R Rating x 800¥<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!