Editing Savage Shadowrun AE Conversion

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 819: Line 819:
 
=== Enemy Personas and Spyders ===
 
=== Enemy Personas and Spyders ===
 
Corporates often hire their own Matrix secruty person to help monitor their Network and fight against hostile Personas (i.e. Deckers like you).
 
Corporates often hire their own Matrix secruty person to help monitor their Network and fight against hostile Personas (i.e. Deckers like you).
 +
 +
Corporate Nodes have multiple layered structures, each with a Firewall security setting to try and stop intruders breaking into their most sensitive areas. The first layer is the Public Forums, or where the corps display the data they want everyone to see. This area is called the Green Node. The system have a basic Firewall of 1 to bypass but most corps have installed at least Firewall 2 or 3 to try and change or alter the data. The next layer is called a private zone or Blue Node with a basic Firewall rating of 2 overall but can be upgraded during security breaches. Generally this is where confidential corporate communication and basic data about the corps are stored. A Decker can find basic bank account information, standard worker (not upper management or off-the books employees) files, etc. here. The next layer is the secret zone or Red Node and most start with at least a Firewall rating of 3 another the MegaCorps often invest in stiffer security of 4. This can be raise by one or two ratings when a security breach is detected. Whenever a Decker runs a Program within a Node they suffer the Firewall rating as a penalty to their checks or it acts as a bonus for the system to overcome the Decker’s programs.
 +
Each of these zone levels must be breached by the Decker to gain access to the next layer. This requires a number of Actions equal to the systems Firewall rating and an Oppose Hacking skill check. Each round spent doing this can potentially alert the system’s security. The systems gets its basic Notice skill plus the Firewall rating Opposed by the Decker’s Sneak or Trickery Matrix skill or against her Ghosting or Spoof program ratings. Success alerts the system of an intruder and what happens depends on the corps size and where the Decker is attempting to access.
 +
 +
Just because the Decker has been able to break into a private or secret zone does not grant them access to everything there. They still must use their Brows or Search Matrix skills or Scan and Sniffer programs to seek out the information or systems that they want and then most bypass any security locks (called Data-Locks) to get to the data. If they are just doing a random search this can take more time as they shift through the data (if they plan on doing it within the system). The system has a chance of detecting the Decker even if they have gained access into the system as it might recognize that they do not belong there. The system makes a Notice check plus the Firewall rating Opposed by the Decker’s Sneak or Trickery Matrix skills or against his Ghosting or Spoof programs. This happens once a minute in a private zone and once a round within a secret zone. For example, a Decker has broken into an Ares Marcotech private subsystem zone (with a Firewall 2) looking for information on the Ares Alpha Assault Rifle design specs and wants to steal the plans for them. He must first make Brows or Search Matrix skill check -2 to locate the data files. Once he has he sees it has a Data-Lock 2 securing the info behind another layer of security. He attempts either a Hacking -4 check (firewall and data-lock rating) or a Passkey program at -2 (the firewall rating) or he could even try and destroy the lock with Erode or simply smash it with the Hammer program but these automatically alert security. Once the information is accessed one need only a round to use the Copy program or a number of rounds equal to its ranting to download it.
  
 
== EMERSION LEVEL WITHIN THE MATRIX ==
 
== EMERSION LEVEL WITHIN THE MATRIX ==

Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see RPGnet:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)