20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sculpting: The node looks a<br />

lot like it does in real life, but with<br />

more flash. Most of the architecture<br />

is translucent, and patrons<br />

who buy a membership are allowed<br />

to fly and to pass through walls.<br />

Hardware: Fifteen custom<br />

Renraku Retailer Hubs (Persona<br />

Limit 10, Processor Limit 20)<br />

Authentication: Web of<br />

Trust (SIN verification)<br />

Privileges: Standard, plus<br />

registered users receive targeted<br />

coupons.<br />

Attributes:<br />

Nodes 1–15: <strong>Firewall</strong><br />

4, Response 3, Signal 5, System 3.<br />

Spiders: 3 Professional<br />

Spiders on duty at all times.<br />

IC: 1 Watanabe Electric<br />

Kitsune 3 per node (patrolling)<br />

Resident Programs:<br />

Nodes 1–15: Analyze 3<br />

ARC: Scramble Security Hacker<br />

Topology: Fifteen identical nodes, each linked via wireless<br />

in a mesh.<br />

Undergraduate Matrix Lab, cambridge, UcaS<br />

This tiny hacker’s den is tucked into a corner of the<br />

MIT&T campus. It is popular system for young hackers and<br />

is often the site of pranks, both on and by the system administrators.<br />

It is an excellent example of a clever security design<br />

without top-of-the-line hardware.<br />

Sculpting: The sculpting in this node changes from semester<br />

to semester. It often includes popular culture references,<br />

beavers, cutting-edge animation, and even some sports iconography<br />

if the Engineers are doing well this season.<br />

Authentication: Varies, usually Linked Passcode, occasionally<br />

Other Authentication Method<br />

Hardware: Each node changes from term to term, and each<br />

is unique (Persona Limit 10–25, Processor Limit 20–50)<br />

Privileges: Standard, but a large percentage of registered<br />

users have security and admin accounts.<br />

Attributes:<br />

Nodes 1–4: <strong>Firewall</strong> 5, Response 2, Signal 2, System 4<br />

Spiders: A random mix of Casual Hackers, Novices,<br />

and Professional Hackers, with the occasional Security<br />

Technomancer. There are 1–6 spiders in the system at any<br />

given time.<br />

IC: 1 MCT Bloodhound 4 per node (patrolling), other IC<br />

(loaded) which varies according to students’ whims<br />

Resident Programs:<br />

Nodes 1–4: Analyze 4, occasionally Encrypt 3<br />

ARC: Variable; use the Random Alert Response table, p.<br />

223, SR4<br />

Topology: Nodes 1 through 4 are linked via wireless in a<br />

mesh. Each uses decoys to prevent access from one to another.<br />

Unwired<br />

dante’s inferno, Hong kong<br />

Like the famous and incrementally exclusive club in real life,<br />

this system has multiple layers of access. Each node is a painstakingly<br />

sculpted version of the real Dante’s Inferno in the Central<br />

District, complete with virtual glass dance floors to give patrons a<br />

look at the icons dancing in the nodes “above” and “below.”<br />

Sculpting: The virtual decor in each node is modeled after<br />

each of ten Buddhist hells. Each node appears as one of the dance<br />

floors in the real-world version of the club, except that the size of<br />

the virtual room changes based on the number of patrons within<br />

it. Special guests are given “super powers,” such as the ability to fly<br />

or dance on the walls and ceiling.<br />

Hardware: Sony Spectacle Nexus (Persona Limit 10,<br />

Processor Limit 35)<br />

Authentication:<br />

Nodes 1–9: Passcode<br />

Nodes 10–11: Passkey<br />

Privileges: Standard, plus user access allows a construct to<br />

appear in the real-world AR system.<br />

Attributes:<br />

Node 1–3: <strong>Firewall</strong> 3, Response 3, Signal 3, System 3<br />

Node 4–6: <strong>Firewall</strong> 4, Response 3, Signal 3, System 3<br />

Node 7–9: <strong>Firewall</strong> 5, Response 4, Signal 3, System 4<br />

Node 10–11: <strong>Firewall</strong> 5, Response 4, Signal 2, System 5<br />

Spiders: 1 Security Consultant and 1 Professional Spider on<br />

duty at all times.<br />

IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per<br />

node (patrolling)<br />

Resident Programs:<br />

Node 1–6: Analyze 3<br />

Node 7–9: Analyze 4<br />

Node 10–11: Analyze 5, Encrypt 5<br />

ARC: Scramble Security Hacker<br />

Topology: Node 1 is open to the Matrix and available for<br />

wireless access. Each of Nodes 1 through 10 are connected sequen-<br />

Simon Wentworth (order #1132857) 9<br />

77<br />

systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!