comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
B A R S C I L W ESS<br />
3 2 3 2 3 4 4 3 5.0<br />
Skills: Computer 4, Data Search 3, Hardware 3, Software 3,<br />
Cybercombat 4, Electronic Warfare 3, Hacking 2, Con 2, Etiquette<br />
3, Perception 2, Pilot Aircraft 3, Pilot Ground Craft 3, Gunnery 3<br />
Cyberware: Commlink, sim module, datajack, control rig<br />
Commlink: System 4, Response 3, <strong>Firewall</strong> 4, Signal 4<br />
Programs: Analyze 4, Armor 4, Attack 3, Blackout 3, Bio-<br />
Feedback Filter 4, Browse 3, Command 3, ECCM 3, Edit 2,<br />
Encrypt 4, Medic 3, Scan 3, Track 4<br />
Matrix Initiative: 7<br />
Matrix IP: 2<br />
Matrix Condition Monitor: 10<br />
Security consultant (professional rating 4)<br />
Security consultants are experts in their field. Some manage the<br />
defense of large or sensitive nodes. Others travel from facility to facility,<br />
bringing the security procedures up to speed during each visit.<br />
B A R S C I L W ESS<br />
3 3 4 3 4 4 4 4 4.8<br />
Skills: Electronics Skill Group 4, Cracking Skill Group 4, Con<br />
3, Etiquette 3, Perception 4, Pilot Aircraft 3, Pilot Ground Craft<br />
4, Gunnery 4<br />
Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />
datajack<br />
Commlink: System 5, Response 4, <strong>Firewall</strong> 5, Signal 4<br />
Programs: Analyze 5, Armor 4, Attack 4, Blackout 4, Bio-<br />
Feedback Filter 5, Browse 3, Command 4, ECCM 4, Edit 2,<br />
Encrypt 4, Medic 3, Scan 4, Track 4<br />
Matrix Initiative: 9<br />
Matrix IP: 3<br />
Matrix Condition Monitor: 11<br />
risk Management engineer (professional rating 5)<br />
“Risk management engineer” is a corporate euphemism for<br />
a digital operative: loyal to the corporation, dedicated to their<br />
jobs, and cold as the machines they use. They can protect a target<br />
electronically and physically, or completely erase it from the world<br />
and the Matrix.<br />
B A R S C I L W ESS<br />
3 3 3 2 4 5 4 5 3.9<br />
Skills: Electronics Skill Group 5, Cracking Skill Group 5, Con<br />
4, Etiquette 3, Perception 4, Pilot Aircraft 4, Pilot Ground Craft<br />
5, Gunnery 5<br />
Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />
datajack, encephalon (Rating 1), math SPU<br />
Commlink: System 5, Response 5, <strong>Firewall</strong> 5, Signal 4<br />
Programs: Analyze 5, Armor 5, Attack 5, Black Hammer 4,<br />
Blackout 4, Bio-Feedback Filter 5, Browse 3, Command 4, ECCM<br />
4, Edit 2, Encrypt 5, Exploit 5, Medic 3, Scan 5, Track 5<br />
Matrix Initiative: 11<br />
Matrix IP: 3<br />
Matrix Condition Monitor: 12<br />
Matrix Support Specialist (professional rating 6)<br />
In the Unwired Age, electronic security keeps soldiers alive<br />
just as much as armor does. These military Matrix specialists cover<br />
military operations from the lowliest commando squad all the<br />
Unwired<br />
way up to the largest division. They are prepared to lay down their<br />
icons and their lives to complete their mission.<br />
B A R S C I L W ESS<br />
4 4 4 3 4 5 5 5 2.65<br />
Skills: Electronics Skill Group 5, Cybercombat 6, Electronic<br />
Warfare 6, Hacking 5, Con 4, Etiquette 3, Perception 4, Pilot<br />
Aircraft 5, Pilot Ground Craft 5, Gunnery 5<br />
Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />
datajack, encephalon (Rating 1), math SPU, simsense booster<br />
Commlink: System 6, Response 6, <strong>Firewall</strong> 6, Signal 5<br />
Programs: Analyze 6, Armor 6, Attack 6, Black Hammer 5,<br />
Blackout 5, Bio-Feedback Filter 6, Browse 3, Command 5, ECCM<br />
5, Edit 2, Encrypt 6, Exploit 6, Medic 5, Scan 6, Sniffer 5, Spoof<br />
4, Stealth 5, Track 6<br />
Matrix Initiative: 12<br />
Matrix IP: 4<br />
Matrix Condition Monitor: 11<br />
intrUSion coUnterMeaSUreS<br />
Intrusion Countermeasures, or IC (pronounced: “ice”) also<br />
helps protect systems from intrusion. Technically, an IC program<br />
is just an agent that is designated for security work, much<br />
the same way that “black IC” is just IC that carries one of the<br />
Scripting<br />
A script can take the form of an actual script,<br />
a list of conditions and actions that the IC runs<br />
through when acting. For example, a script for the<br />
MCT Bloodhound might look like this:<br />
1. Is there an active <strong>alert</strong>?<br />
a. If yes, then go to 2.<br />
b. If no, then go to 5.<br />
2. Has the intruder already been Tracked successfully?<br />
a. If yes, then stand down.<br />
b. If no, then go to 3.<br />
3. Perform a Track on the intruder. Go to 4.<br />
4. Does the Track finish successfully?<br />
a. If yes, notify spider of intruder’s location and<br />
access ID. End action for this Initiative Pass.<br />
b. If no, end action for this Initiative Pass.<br />
5. Perform Matrix Perception Test on the icon<br />
that has been Analyzed least recently. Go to 6.<br />
6. Is the Analyzed icon an intruder?<br />
a. If yes, initiate an active <strong>alert</strong> and End action<br />
for this Initiative Pass.<br />
b. If no, end action for this Initiative Pass.<br />
This format is longer and more involved than a<br />
brief description, but reflects the IC’s limited decision-making<br />
abilities. When using this method<br />
of scripting, remember to make sure that every<br />
numbered entry can be reached from another (except<br />
the first, which is where the IC starts), and<br />
that every entry either leads to another entry or<br />
ends the IC’s turn in the Initiative Pass.<br />
Simon Wentworth (order #1132857) 9<br />
69<br />
systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .