20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B A R S C I L W ESS<br />

3 2 3 2 3 4 4 3 5.0<br />

Skills: Computer 4, Data Search 3, Hardware 3, Software 3,<br />

Cybercombat 4, Electronic Warfare 3, Hacking 2, Con 2, Etiquette<br />

3, Perception 2, Pilot Aircraft 3, Pilot Ground Craft 3, Gunnery 3<br />

Cyberware: Commlink, sim module, datajack, control rig<br />

Commlink: System 4, Response 3, <strong>Firewall</strong> 4, Signal 4<br />

Programs: Analyze 4, Armor 4, Attack 3, Blackout 3, Bio-<br />

Feedback Filter 4, Browse 3, Command 3, ECCM 3, Edit 2,<br />

Encrypt 4, Medic 3, Scan 3, Track 4<br />

Matrix Initiative: 7<br />

Matrix IP: 2<br />

Matrix Condition Monitor: 10<br />

Security consultant (professional rating 4)<br />

Security consultants are experts in their field. Some manage the<br />

defense of large or sensitive nodes. Others travel from facility to facility,<br />

bringing the security procedures up to speed during each visit.<br />

B A R S C I L W ESS<br />

3 3 4 3 4 4 4 4 4.8<br />

Skills: Electronics Skill Group 4, Cracking Skill Group 4, Con<br />

3, Etiquette 3, Perception 4, Pilot Aircraft 3, Pilot Ground Craft<br />

4, Gunnery 4<br />

Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />

datajack<br />

Commlink: System 5, Response 4, <strong>Firewall</strong> 5, Signal 4<br />

Programs: Analyze 5, Armor 4, Attack 4, Blackout 4, Bio-<br />

Feedback Filter 5, Browse 3, Command 4, ECCM 4, Edit 2,<br />

Encrypt 4, Medic 3, Scan 4, Track 4<br />

Matrix Initiative: 9<br />

Matrix IP: 3<br />

Matrix Condition Monitor: 11<br />

risk Management engineer (professional rating 5)<br />

“Risk management engineer” is a corporate euphemism for<br />

a digital operative: loyal to the corporation, dedicated to their<br />

jobs, and cold as the machines they use. They can protect a target<br />

electronically and physically, or completely erase it from the world<br />

and the Matrix.<br />

B A R S C I L W ESS<br />

3 3 3 2 4 5 4 5 3.9<br />

Skills: Electronics Skill Group 5, Cracking Skill Group 5, Con<br />

4, Etiquette 3, Perception 4, Pilot Aircraft 4, Pilot Ground Craft<br />

5, Gunnery 5<br />

Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />

datajack, encephalon (Rating 1), math SPU<br />

Commlink: System 5, Response 5, <strong>Firewall</strong> 5, Signal 4<br />

Programs: Analyze 5, Armor 5, Attack 5, Black Hammer 4,<br />

Blackout 4, Bio-Feedback Filter 5, Browse 3, Command 4, ECCM<br />

4, Edit 2, Encrypt 5, Exploit 5, Medic 3, Scan 5, Track 5<br />

Matrix Initiative: 11<br />

Matrix IP: 3<br />

Matrix Condition Monitor: 12<br />

Matrix Support Specialist (professional rating 6)<br />

In the Unwired Age, electronic security keeps soldiers alive<br />

just as much as armor does. These military Matrix specialists cover<br />

military operations from the lowliest commando squad all the<br />

Unwired<br />

way up to the largest division. They are prepared to lay down their<br />

icons and their lives to complete their mission.<br />

B A R S C I L W ESS<br />

4 4 4 3 4 5 5 5 2.65<br />

Skills: Electronics Skill Group 5, Cybercombat 6, Electronic<br />

Warfare 6, Hacking 5, Con 4, Etiquette 3, Perception 4, Pilot<br />

Aircraft 5, Pilot Ground Craft 5, Gunnery 5<br />

Cyberware: Commlink, sim module (w/ hot-sim), control rig,<br />

datajack, encephalon (Rating 1), math SPU, simsense booster<br />

Commlink: System 6, Response 6, <strong>Firewall</strong> 6, Signal 5<br />

Programs: Analyze 6, Armor 6, Attack 6, Black Hammer 5,<br />

Blackout 5, Bio-Feedback Filter 6, Browse 3, Command 5, ECCM<br />

5, Edit 2, Encrypt 6, Exploit 6, Medic 5, Scan 6, Sniffer 5, Spoof<br />

4, Stealth 5, Track 6<br />

Matrix Initiative: 12<br />

Matrix IP: 4<br />

Matrix Condition Monitor: 11<br />

intrUSion coUnterMeaSUreS<br />

Intrusion Countermeasures, or IC (pronounced: “ice”) also<br />

helps protect systems from intrusion. Technically, an IC program<br />

is just an agent that is designated for security work, much<br />

the same way that “black IC” is just IC that carries one of the<br />

Scripting<br />

A script can take the form of an actual script,<br />

a list of conditions and actions that the IC runs<br />

through when acting. For example, a script for the<br />

MCT Bloodhound might look like this:<br />

1. Is there an active <strong>alert</strong>?<br />

a. If yes, then go to 2.<br />

b. If no, then go to 5.<br />

2. Has the intruder already been Tracked successfully?<br />

a. If yes, then stand down.<br />

b. If no, then go to 3.<br />

3. Perform a Track on the intruder. Go to 4.<br />

4. Does the Track finish successfully?<br />

a. If yes, notify spider of intruder’s location and<br />

access ID. End action for this Initiative Pass.<br />

b. If no, end action for this Initiative Pass.<br />

5. Perform Matrix Perception Test on the icon<br />

that has been Analyzed least recently. Go to 6.<br />

6. Is the Analyzed icon an intruder?<br />

a. If yes, initiate an active <strong>alert</strong> and End action<br />

for this Initiative Pass.<br />

b. If no, end action for this Initiative Pass.<br />

This format is longer and more involved than a<br />

brief description, but reflects the IC’s limited decision-making<br />

abilities. When using this method<br />

of scripting, remember to make sure that every<br />

numbered entry can be reached from another (except<br />

the first, which is where the IC starts), and<br />

that every entry either leads to another entry or<br />

ends the IC’s turn in the Initiative Pass.<br />

Simon Wentworth (order #1132857) 9<br />

69<br />

systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!