20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

with their image links is an expense that many corporations,<br />

governments, and other entities see as unnecessary. Some facilities<br />

compromise with systems that are cabled except in wireless “safe<br />

rooms” protected by wireless negation.<br />

traffic and access<br />

The physical location of the devices in a system is another important<br />

security concern. Some placements are obvious: cameras<br />

should be placed at entrances, locks are installed into doors, etc.<br />

Standard nodes and nexi, on the other hand, can be placed almost<br />

anywhere, especially in a wireless environment. It is important,<br />

therefore, to give proper consideration to the placement of such<br />

devices, to deny physical access to any person that does not need to<br />

have access to them. By the same token, they should be kept away<br />

from the main flow of physical traffic in which most personnel<br />

work or travel.<br />

SecUritY networkS and rigging<br />

A facility’s physical defenses can be effective on their own,<br />

with autonomous devices and security sensors, but when combined<br />

with a security specialist, or spider, they can keep out all<br />

but the most tenacious intruder. The various security devices in a<br />

facility are joined together by one or more hub nodes into a security<br />

network, which is overseen by spiders. This section discusses<br />

security networks in practice; more information about the spiders<br />

that use this practice can be found later in this chapter.<br />

the Security network<br />

A security network is simply a network of devices that are<br />

assigned security roles. These devices usually include cameras and<br />

other sensors, locks, automated doors, drones, and automated systems<br />

such as gun emplacements or containment systems. Anything<br />

with a Device, System, or Pilot rating can be integrated into a security<br />

network, including agents, IC, and even the smartguns and<br />

cybereyes of security guards.<br />

These devices are then linked or slaved to one or more security<br />

hubs. A security hub is simply a device that acts as a focal point<br />

for command and control of the network. It can be a standard<br />

node or a nexus, or even a commlink. The spider on duty monitors<br />

the hub, and often uses it to run his persona. Any device or icon<br />

that is linked or slaved to the network is considered linked to all<br />

other devices in the network.<br />

In large installations, it is not uncommon to find multiple<br />

security hubs dividing the security. In some networks, the split is<br />

geographical, with different hubs controlling different areas of a<br />

facility. In others, the hubs are assigned to different types of security,<br />

with one hub handling drones, another handling locks and<br />

doors, another dealing with security personnel, and so forth.<br />

Security networks do not need to be installed in a permanent<br />

facility. They are installed in vehicles like semi-trailers, aircraft,<br />

and naval vessels. Security networks do not need to have physical<br />

bounds, and are found protecting police squads, military fire<br />

teams, and even shadowrunning groups.<br />

information operations<br />

The most basic function of a security network is to allow a<br />

spider to observe a large area from a single location. Devices in<br />

a security network send a constant stream of real-time data to<br />

Unwired<br />

the hub node, or to multiple hub nodes. Should a device detect<br />

a status change (e.g. a camera sees movement, a weapon is fired, a<br />

program in a node starts or stops, etc.), it automatically notifies the<br />

spider using a Free Action. The spider can then use the Observe in<br />

Detail action (p. 136, SR4) to investigate using the data feed from<br />

the specific device.<br />

remote command and control<br />

A security network allows a spider to do more than merely<br />

observe. A spider is empowered by her security network to take indirect<br />

or direct action against intruders and other security threats.<br />

The simplest way this is accomplished is through command and<br />

control, using the network to communicate orders and information.<br />

The spider can use the Issue Command action (p. 221, SR4)<br />

to send instructions to any automated device on the network. She<br />

may also use the Speak/Text Phrase action (p. 136, SR4) to direct<br />

security personnel, or if more detail is necessary, she can use the<br />

Transfer Data action (p. 219, SR4) to send a full situation report<br />

and orders.<br />

Another option for the spider is to use the Command<br />

program to control a subscribed device on the network (see<br />

Controlling Devices, p. 220, SR4). This can be done in AR or VR,<br />

and does not require any form of simsense. This option allows<br />

the spider to address a security breach in conventional ways, such<br />

as by firing an automated gun or controlling a drone, or unusual<br />

and creative ways, such as opening a door in an intruder’s face,<br />

changing the temperature in a room, or using the lights to flash a<br />

message in Morse code.<br />

A spider using VR can also jump into any device fitted with<br />

a rigger adaptation (p. 341, SR4). In most security networks,<br />

this is limited to drones. Some more creative security engineers<br />

add rigger adaptation to other devices, such as sensors, gun emplacements,<br />

and repair or medical facilities. It is possible to add a<br />

rigger adaptation to other devices, such as automated doors and<br />

windows, locks, and vending machines, but the utility of such a<br />

modification is rarely very great.<br />

For more info, see A Note on Commanding Devices, p. 104.<br />

Matrix SecUritY<br />

While the physical arrangement around a system is important<br />

to its security, most of the action happens in the Matrix.<br />

Security personnel called spiders act as hackers and/or riggers<br />

from within the system, guarding it against intrusion. Intrusion<br />

countermeasures (IC) are run on nodes to guard them from<br />

attackers, or to mount their own attack against trespassing<br />

hackers. Even the very shape of the system’s virtual layout can<br />

aid in its defense.<br />

aUtHentication<br />

The first line of security is authentication, the process by<br />

which a system determines whether the claimed identity of a user<br />

is genuine. The node must be reasonably certain that a user is who<br />

he says he is, and is therefore entitled to the account privileges<br />

listed for that user.<br />

There are several different ways for a system to authenticate<br />

a user. Some are more reliable and secure than others, although<br />

for the most part, the more secure an authentication method, the<br />

higher its overhead costs.<br />

Simon Wentworth (order #1132857) 9<br />

63<br />

systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!