20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hardware: Saeder-Krupp Schwermetall high-security<br />

nexus (Persona Limit 25, Processor Limit 110)<br />

Authentication:<br />

User: Linked Passcode<br />

Security and Admin: Nanotech Passkey<br />

Privileges: Standard, plus user accounts may make transactions<br />

on their own accounts<br />

Attributes: <strong>Firewall</strong> 9, Response 8, Signal 4, System 8<br />

(all nodes)<br />

Spiders: 2 Matrix Support Specialists and 4 Risk<br />

Management Engineers on duty at all times<br />

IC: 3 Watanabe Electric Kitsune 7, 2 Renraku Oniwaban<br />

8, 2 Rumpelstiltskin 8, 2 MCT Bloodhound 8 (patroling)<br />

Resident Programs: Analyze 8<br />

ARC: Scramble Security Hacker<br />

Topology: The topology<br />

is that of the onionskin, with<br />

a spiral of sixteen successive<br />

nodes. Each node is a gateway<br />

to the next. Node 1 has access<br />

via wireless to the Matrix. Each<br />

node is connected to the previous<br />

and following nodes by<br />

fiber optic cable. Nodes 2–8<br />

are for standard clients, nodes<br />

9–12 are for more exclusive<br />

clients, and node 13–14 are<br />

for exclusive clients. Node 15<br />

handles both the administration<br />

and physical security in the<br />

building, and node 16 is connected<br />

to the satellite uplink.<br />

aBStract Matrix rUnS<br />

Sometimes it is impractical to run an entire<br />

system during play. This is especially true when<br />

the entire group of players is present, and there<br />

is only one Matrix specialist at the table. In these<br />

cases, simply abstract the entire system into a<br />

single meta-node. Use the highest values of each<br />

attribute for the meta-node, along with as much<br />

of the IC and running programs as is feasible.<br />

For example, the BIS Büro sample system<br />

would be abstracted to a single node with <strong>Firewall</strong><br />

5, Response 4, Signal 4, System 5, one Security<br />

Consultant, a patrolling MCT Bloodhound, and a<br />

loaded Three Musketeers Suite.<br />

SecUritY in action<br />

So what does all of this look like in action? How might<br />

the various components of a secure system work to prevent,<br />

or at least slow, an intrusion? This is an extended example of<br />

the security involved in a hacking attempt. The example uses<br />

the Professional Spider from Sample Spiders, p. 68, and the<br />

Choson Lair sample node, above.<br />

SecUritY exaMpLe<br />

Jin, a Professional Spider for the Choson, has been assigned<br />

to secure a new Lair in Seattle. She is monitoring the<br />

node in AR, but her attention is focused on her morning<br />

soaps.<br />

The node is running Analyze, Encrypt, and a Kitsune<br />

IC program. Additionally, the IC is running its own Analyze<br />

program, for a total of four programs, well below the sixteenprogram<br />

limit of the node.<br />

A hacker has broken the Lair’s encryption, probed the<br />

system, and enters the node. The node is running Analyze, and<br />

makes a single Analyze + <strong>Firewall</strong> Test to detect the intrusion.<br />

The gamemaster rolls eight dice for the node and gets four<br />

hits, missing the hacker’s Stealth by one hit. The hacker enters<br />

the node with a hacked admin account.<br />

Unwired<br />

The Kitsune IC running on the node is programmed to<br />

check out new icons, and it does so. The Kitsune icon greets<br />

the intruder and performs a Matrix Perception Test using its<br />

own Analyze program, rolling eight dice in an Opposed Test<br />

against the hacker’s Stealth + Hacking, which is a dice pool of<br />

12. The IC rolls four hits, and the hacker rolls four; with zero<br />

net hits, the Kitsune finds nothing suspicious about this new<br />

icon, and allows the hacker to operate within the node.<br />

The hacker performs a Deactivate Agent action to shut<br />

down the Kitsune program before it has a chance to see<br />

through his Stealth program. Since this action is allowed to<br />

users with admin accounts, there is no roll needed, and the<br />

Kitsune program’s status switches from running to loaded.<br />

Since Jin is watching the node, she makes a Matrix<br />

Perception Test to see if she notices the program being shut<br />

down, and succeeds. She<br />

performs a Log On action to<br />

activate a subscription and arrive<br />

in the node, using a Free<br />

Action to flip into VR. The<br />

hacker then performs his own<br />

action to accomplish his mission<br />

in the node.<br />

Jin is suspicious enough<br />

to initiate an active <strong>alert</strong>, and<br />

does so as a Free Action on her<br />

next turn. The node executes its<br />

ARC, immediately launching<br />

the Juhseung Saja IC program.<br />

Jin then spends a Complex<br />

Action to load an Attack program,<br />

ending her turn.<br />

The hacker sees the IC<br />

activating and recognizes its icon. He tries to get the system<br />

to unload it, figuring (correctly) that he might have more<br />

Initiative Passes than the spider and so buy some time. He rolls<br />

his Hacking + Exploit (a dice pool of 12) against the node’s<br />

<strong>Firewall</strong> + System (8 dice). The hacker rolls five hits, but so<br />

does the node, so his attempt fails.<br />

The IC loads its Blackout program, while Jin takes a<br />

shot at the intruder. She makes a Cybercombat + Attack Test<br />

against the hacker’s <strong>Firewall</strong> + Response. She gets three hits,<br />

while the hacker only gets two, and causes 4 DV of Matrix<br />

damage. The hacker manages to resist all of this damage with<br />

his System + Armor, but only barely.<br />

At this point, the hacker decides to bail, and disconnects<br />

from the node. Jin shuts down the Juhseung Saja IC and assesses<br />

the damage. The node’s file system has been compromised, and<br />

the hacker got away with the data he wanted. However, he did<br />

not have time to remove his datatrail from the node’s access log,<br />

and Jin runs and then uses a Track program using that information.<br />

She finds out that the hacker was making his run from the<br />

Pine Cone Restaurant near I-90, and sends that information to<br />

operatives in the field. She goes back to her soaps, knowing that<br />

even if the operatives investigate the restaurant, the hacker will be<br />

long gone.<br />

Simon Wentworth (order #1132857) 9<br />

79<br />

systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!