comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Sculpting: The node looks a<br />
lot like it does in real life, but with<br />
more flash. Most of the architecture<br />
is translucent, and patrons<br />
who buy a membership are allowed<br />
to fly and to pass through walls.<br />
Hardware: Fifteen custom<br />
Renraku Retailer Hubs (Persona<br />
Limit 10, Processor Limit 20)<br />
Authentication: Web of<br />
Trust (SIN verification)<br />
Privileges: Standard, plus<br />
registered users receive targeted<br />
coupons.<br />
Attributes:<br />
Nodes 1–15: <strong>Firewall</strong><br />
4, Response 3, Signal 5, System 3.<br />
Spiders: 3 Professional<br />
Spiders on duty at all times.<br />
IC: 1 Watanabe Electric<br />
Kitsune 3 per node (patrolling)<br />
Resident Programs:<br />
Nodes 1–15: Analyze 3<br />
ARC: Scramble Security Hacker<br />
Topology: Fifteen identical nodes, each linked via wireless<br />
in a mesh.<br />
Undergraduate Matrix Lab, cambridge, UcaS<br />
This tiny hacker’s den is tucked into a corner of the<br />
MIT&T campus. It is popular system for young hackers and<br />
is often the site of pranks, both on and by the system administrators.<br />
It is an excellent example of a clever security design<br />
without top-of-the-line hardware.<br />
Sculpting: The sculpting in this node changes from semester<br />
to semester. It often includes popular culture references,<br />
beavers, cutting-edge animation, and even some sports iconography<br />
if the Engineers are doing well this season.<br />
Authentication: Varies, usually Linked Passcode, occasionally<br />
Other Authentication Method<br />
Hardware: Each node changes from term to term, and each<br />
is unique (Persona Limit 10–25, Processor Limit 20–50)<br />
Privileges: Standard, but a large percentage of registered<br />
users have security and admin accounts.<br />
Attributes:<br />
Nodes 1–4: <strong>Firewall</strong> 5, Response 2, Signal 2, System 4<br />
Spiders: A random mix of Casual Hackers, Novices,<br />
and Professional Hackers, with the occasional Security<br />
Technomancer. There are 1–6 spiders in the system at any<br />
given time.<br />
IC: 1 MCT Bloodhound 4 per node (patrolling), other IC<br />
(loaded) which varies according to students’ whims<br />
Resident Programs:<br />
Nodes 1–4: Analyze 4, occasionally Encrypt 3<br />
ARC: Variable; use the Random Alert Response table, p.<br />
223, SR4<br />
Topology: Nodes 1 through 4 are linked via wireless in a<br />
mesh. Each uses decoys to prevent access from one to another.<br />
Unwired<br />
dante’s inferno, Hong kong<br />
Like the famous and incrementally exclusive club in real life,<br />
this system has multiple layers of access. Each node is a painstakingly<br />
sculpted version of the real Dante’s Inferno in the Central<br />
District, complete with virtual glass dance floors to give patrons a<br />
look at the icons dancing in the nodes “above” and “below.”<br />
Sculpting: The virtual decor in each node is modeled after<br />
each of ten Buddhist hells. Each node appears as one of the dance<br />
floors in the real-world version of the club, except that the size of<br />
the virtual room changes based on the number of patrons within<br />
it. Special guests are given “super powers,” such as the ability to fly<br />
or dance on the walls and ceiling.<br />
Hardware: Sony Spectacle Nexus (Persona Limit 10,<br />
Processor Limit 35)<br />
Authentication:<br />
Nodes 1–9: Passcode<br />
Nodes 10–11: Passkey<br />
Privileges: Standard, plus user access allows a construct to<br />
appear in the real-world AR system.<br />
Attributes:<br />
Node 1–3: <strong>Firewall</strong> 3, Response 3, Signal 3, System 3<br />
Node 4–6: <strong>Firewall</strong> 4, Response 3, Signal 3, System 3<br />
Node 7–9: <strong>Firewall</strong> 5, Response 4, Signal 3, System 4<br />
Node 10–11: <strong>Firewall</strong> 5, Response 4, Signal 2, System 5<br />
Spiders: 1 Security Consultant and 1 Professional Spider on<br />
duty at all times.<br />
IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per<br />
node (patrolling)<br />
Resident Programs:<br />
Node 1–6: Analyze 3<br />
Node 7–9: Analyze 4<br />
Node 10–11: Analyze 5, Encrypt 5<br />
ARC: Scramble Security Hacker<br />
Topology: Node 1 is open to the Matrix and available for<br />
wireless access. Each of Nodes 1 through 10 are connected sequen-<br />
Simon Wentworth (order #1132857) 9<br />
77<br />
systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .