comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Hardware: Saeder-Krupp Schwermetall high-security<br />
nexus (Persona Limit 25, Processor Limit 110)<br />
Authentication:<br />
User: Linked Passcode<br />
Security and Admin: Nanotech Passkey<br />
Privileges: Standard, plus user accounts may make transactions<br />
on their own accounts<br />
Attributes: <strong>Firewall</strong> 9, Response 8, Signal 4, System 8<br />
(all nodes)<br />
Spiders: 2 Matrix Support Specialists and 4 Risk<br />
Management Engineers on duty at all times<br />
IC: 3 Watanabe Electric Kitsune 7, 2 Renraku Oniwaban<br />
8, 2 Rumpelstiltskin 8, 2 MCT Bloodhound 8 (patroling)<br />
Resident Programs: Analyze 8<br />
ARC: Scramble Security Hacker<br />
Topology: The topology<br />
is that of the onionskin, with<br />
a spiral of sixteen successive<br />
nodes. Each node is a gateway<br />
to the next. Node 1 has access<br />
via wireless to the Matrix. Each<br />
node is connected to the previous<br />
and following nodes by<br />
fiber optic cable. Nodes 2–8<br />
are for standard clients, nodes<br />
9–12 are for more exclusive<br />
clients, and node 13–14 are<br />
for exclusive clients. Node 15<br />
handles both the administration<br />
and physical security in the<br />
building, and node 16 is connected<br />
to the satellite uplink.<br />
aBStract Matrix rUnS<br />
Sometimes it is impractical to run an entire<br />
system during play. This is especially true when<br />
the entire group of players is present, and there<br />
is only one Matrix specialist at the table. In these<br />
cases, simply abstract the entire system into a<br />
single meta-node. Use the highest values of each<br />
attribute for the meta-node, along with as much<br />
of the IC and running programs as is feasible.<br />
For example, the BIS Büro sample system<br />
would be abstracted to a single node with <strong>Firewall</strong><br />
5, Response 4, Signal 4, System 5, one Security<br />
Consultant, a patrolling MCT Bloodhound, and a<br />
loaded Three Musketeers Suite.<br />
SecUritY in action<br />
So what does all of this look like in action? How might<br />
the various components of a secure system work to prevent,<br />
or at least slow, an intrusion? This is an extended example of<br />
the security involved in a hacking attempt. The example uses<br />
the Professional Spider from Sample Spiders, p. 68, and the<br />
Choson Lair sample node, above.<br />
SecUritY exaMpLe<br />
Jin, a Professional Spider for the Choson, has been assigned<br />
to secure a new Lair in Seattle. She is monitoring the<br />
node in AR, but her attention is focused on her morning<br />
soaps.<br />
The node is running Analyze, Encrypt, and a Kitsune<br />
IC program. Additionally, the IC is running its own Analyze<br />
program, for a total of four programs, well below the sixteenprogram<br />
limit of the node.<br />
A hacker has broken the Lair’s encryption, probed the<br />
system, and enters the node. The node is running Analyze, and<br />
makes a single Analyze + <strong>Firewall</strong> Test to detect the intrusion.<br />
The gamemaster rolls eight dice for the node and gets four<br />
hits, missing the hacker’s Stealth by one hit. The hacker enters<br />
the node with a hacked admin account.<br />
Unwired<br />
The Kitsune IC running on the node is programmed to<br />
check out new icons, and it does so. The Kitsune icon greets<br />
the intruder and performs a Matrix Perception Test using its<br />
own Analyze program, rolling eight dice in an Opposed Test<br />
against the hacker’s Stealth + Hacking, which is a dice pool of<br />
12. The IC rolls four hits, and the hacker rolls four; with zero<br />
net hits, the Kitsune finds nothing suspicious about this new<br />
icon, and allows the hacker to operate within the node.<br />
The hacker performs a Deactivate Agent action to shut<br />
down the Kitsune program before it has a chance to see<br />
through his Stealth program. Since this action is allowed to<br />
users with admin accounts, there is no roll needed, and the<br />
Kitsune program’s status switches from running to loaded.<br />
Since Jin is watching the node, she makes a Matrix<br />
Perception Test to see if she notices the program being shut<br />
down, and succeeds. She<br />
performs a Log On action to<br />
activate a subscription and arrive<br />
in the node, using a Free<br />
Action to flip into VR. The<br />
hacker then performs his own<br />
action to accomplish his mission<br />
in the node.<br />
Jin is suspicious enough<br />
to initiate an active <strong>alert</strong>, and<br />
does so as a Free Action on her<br />
next turn. The node executes its<br />
ARC, immediately launching<br />
the Juhseung Saja IC program.<br />
Jin then spends a Complex<br />
Action to load an Attack program,<br />
ending her turn.<br />
The hacker sees the IC<br />
activating and recognizes its icon. He tries to get the system<br />
to unload it, figuring (correctly) that he might have more<br />
Initiative Passes than the spider and so buy some time. He rolls<br />
his Hacking + Exploit (a dice pool of 12) against the node’s<br />
<strong>Firewall</strong> + System (8 dice). The hacker rolls five hits, but so<br />
does the node, so his attempt fails.<br />
The IC loads its Blackout program, while Jin takes a<br />
shot at the intruder. She makes a Cybercombat + Attack Test<br />
against the hacker’s <strong>Firewall</strong> + Response. She gets three hits,<br />
while the hacker only gets two, and causes 4 DV of Matrix<br />
damage. The hacker manages to resist all of this damage with<br />
his System + Armor, but only barely.<br />
At this point, the hacker decides to bail, and disconnects<br />
from the node. Jin shuts down the Juhseung Saja IC and assesses<br />
the damage. The node’s file system has been compromised, and<br />
the hacker got away with the data he wanted. However, he did<br />
not have time to remove his datatrail from the node’s access log,<br />
and Jin runs and then uses a Track program using that information.<br />
She finds out that the hacker was making his run from the<br />
Pine Cone Restaurant near I-90, and sends that information to<br />
operatives in the field. She goes back to her soaps, knowing that<br />
even if the operatives investigate the restaurant, the hacker will be<br />
long gone.<br />
Simon Wentworth (order #1132857) 9<br />
79<br />
systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .