Editing Savage Shadowrun AE Conversion

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 756: Line 756:
 
*'''Tier IV''' (Red): Security at this level is for secret data and/or research on the Host. Generally this is where confidential corporate communication and basic data about the corps are stored.  These site also include Grey IC programs that are more serious attack programs. The data here could be embarashing or worth a lot as data other corps or agencies want like a bleeding edge program that can better sleazy past IC or the latest version of the Predator'a smartgun interface system, etc. Firewalls and alerts are fast as the system responses to intrudes here. Tier IV systems can ignore two Multi-Action penalties a round and draw two cards, taking the best for Initiative (as Level Headed edge).
 
*'''Tier IV''' (Red): Security at this level is for secret data and/or research on the Host. Generally this is where confidential corporate communication and basic data about the corps are stored.  These site also include Grey IC programs that are more serious attack programs. The data here could be embarashing or worth a lot as data other corps or agencies want like a bleeding edge program that can better sleazy past IC or the latest version of the Predator'a smartgun interface system, etc. Firewalls and alerts are fast as the system responses to intrudes here. Tier IV systems can ignore two Multi-Action penalties a round and draw two cards, taking the best for Initiative (as Level Headed edge).
 
*'''Tier V''' (Ultra): This level of security is only available to the megacorps or important agencies where they keep the most sensitive and important data secrets. This could be plans and sematics for a new missile system or AI program or for the conspiracy minded -- where the UFOs are keep and experimented on. Black IC is often used here and a decker had better be good and have the best bleed edge tech to survive long in such a system. Tier V systems can ignore two Multi-Action penalties a round and draw three cards, taking the best for Initiative (as Imp. Level Headed edge).
 
*'''Tier V''' (Ultra): This level of security is only available to the megacorps or important agencies where they keep the most sensitive and important data secrets. This could be plans and sematics for a new missile system or AI program or for the conspiracy minded -- where the UFOs are keep and experimented on. Black IC is often used here and a decker had better be good and have the best bleed edge tech to survive long in such a system. Tier V systems can ignore two Multi-Action penalties a round and draw three cards, taking the best for Initiative (as Imp. Level Headed edge).
 +
 +
===Device and Matrix Security===
 +
Getting Access to a device, computer system or secure Network Host requires some skill and programs. In game this can take a few steps. All devices and host sites have a Tiered level of security attached to them. This includes a Firewall system and a basic AI that 'watches' out for these intrusions. This AI also helps the owner of the device to access their own data etc. 
 +
 +
The Security Rating are the systems used to protect device and host from criminals trying to access their system. A basic Comlink or Mom & Pop small business generally cannot reasonably afford more thebn a a Tier I or II rated system for their security. They might upgrade the Firewall system independently but the system basic stats and skills are far more expensive. Moderately sized corporates and governent Agencies can afford Tier III or maybe Tier IV for some but only the Megacorps and largest most secure government agencies can afford Tier V.
 +
 +
The Security Systems '''Tier''' level is how advanced the system is. The '''Code''' is the general basic mod that the systems AI oerates under. The higher the Rank/Tier of a systems AI the higher its basic '''System Stats''' and '''Firewall''' will be. They systems Firewall acts as a penalty for hostile hackers trying to break into a system and as a bonusfor the AI system to detect and repeal such attempts. The AI system stats include its Smarts (how well and how fast it can react to a situation and/or recognize danger to the system) its Hacking skill (its ability to resist hosital hacking attempts) and it basic Matrix skills of Browse (Matrix Notice) and Search (Matrix Research).
 +
 +
Note that the Security System is really only there to monitor its Host, watching for code errors and intuders. Its function is to raise alarms when it detects a problem and/or try to boot hostile Personas or programs from its systems. It still draws Initiative cards and acts in the round as it tries to "fix" any problems that it might encounter.
 +
 +
Intrusion Countermeasures or IC (see below) is the more proactive attack-dog programs used to protect to system.
 +
{| class="wikitable" border="0"
 +
|-
 +
| '''Tier''' || '''Code''' || '''Example(s)''' || '''Firewall''' || '''Basic AI System Stats'''
 +
|-
 +
| I || Green || Comlink, Public Forum || 1 || Smarts d4, Hacking d4, Browse d4, Search d4
 +
|-
 +
| II || Blue || Private Data || 2 || Smarts d6, Hacking d6, Browse d6, Search d6
 +
|-
 +
| III || Orange || Secure Data or Hosts || 3 or 4 || Smarts d8, Hacking d8, Browse d8, Search d8
 +
|-
 +
| IV || Red || Secret Hosts || 4 or 5 || Smarts d10, Hacking d10, Browse d10, Search d10
 +
|-
 +
| V || Ultra || Ultra Secret Hosts || 6+ || Smarts d12, Hacking d12, Browse d12, Search d12
 +
|-
 +
|}
 +
*'''Teir I''' (Green): Basic secure system common for basic devices, computer system, comlink, maglock, securty cameras, cybernetic system, drone or vehicle, and public forums (just so pranksters can't post offensive comments or change the basic data found here) and small stores and even vending machines. These systemss inclues no IC beyond maybe shutting down to prevent damage or thief. Tier I can take a single Action each round, generally to detect problems, raise an alarm or trying to Boot a hostile Persona.
 +
*'''Tier II''' (Blue): Some additional security to protect private or personal data and systems to basic security against hackers looking to steal basic info or items that a Host might provide to the public or hack an well secured Rigged vehicles, etc. This Tier might include some low end 'White' IC programs like Tracers and Alarms that can alert great response. In a bigger corporation when a alert is sounded the Host might even increase the Firewall and dispatched more serious security. This can be expensive though and is uncommon except for larger corps or agencies. Tier II systems can ignore one Multi-Action penalty a round.
 +
*'''Tier III''' (Orange): Security here will be protecting more secure information and/or personal data like low-level bank accounts, standard wageslave personal data (not upper management or off-the books employees) files or basic research papers on low end gear or programs. White IC is common at this Tier and depending on the size and wealth of the Host can increase the areas Firewall rating faster. Tier III system can ignore one Multi-Action penalty a round and draw two cards, taking the best for Initiative (as the Level Headed edge).
 +
*'''Tier IV''' (Red): Security at this level is for secret data and/or research on the Host. Generally this is where confidential corporate communication and basic data about the corps are stored.  These site also include Grey IC programs that are more serious attack programs. The data here could be embarashing or worth a lot as data other corps or agencies want like a bleeding edge program that can better sleazy past IC or the latest version of the Predator'a smartgun interface system, etc. Firewalls and alerts are fast as the system responses to intrudes here. Tier IV systems can ignore two Multi-Action penalties a round and draw two cards, taking the best for Initiative (as Level Headed edge).
 +
*'''Tier V''' (Ultra): This level of security is only available to the megacorps or important agencies where they keep the most sensitive and important data secrets. This could be plans and sematics for a new missile system or AI program or for the conspiracy minded -- where the UFOs are keep and experimented on. Black IC is often used here and a decker had better be good and have the best bleed edge tech to survive long in such a system. Tier V systems can ignore two Multi-Action penalties a round and draw three cards, taking the best for Initiative (as Imp. Level Headed edge).
 +
 +
When a decker trying to bypass a device or hosts security to cause problems or steal data they must first gain 'Access' to the First Tier of the system's security. This requires an Action and Hacking skill check minus the devices Firewall rating. Success allows Access to the first Tier of security. This might grant the hacker the basic private information of the user but also could unlock a maglocked door or access a security camera feed to see what it sees etc. 
 +
 +
With failured attempt the hacker can try again next round as an Action but this alerts the device user that someone is attempting to access their device. The user could be the devices owner or the system Host security AI. If the hacker is running a Spoof or Sneak program she can make an opposed check verses the device owners or security AI's Notice or Matrix Browse skill. adding their device's Firewall rating as a bonus to this roll. If the decker success the system or user is not aware of the attempted hack and the decker can proceed as normal. If the host or user wins they can reacte in a number of ways. An individual device or computer system might simply be turned off. Or the user or security AI could try a Counter Hacking attempt to boot the hacker from its system. This requires an Opposed Hacking skill check with a bonus to the user equal to the systems Firewall rating. If the user wins it can boot the hacker from their system.
 +
 +
A hacker that is booted off the system can try to gain access on the following round as above, but they suffer a additional cumulative -2 to all future checks for each time they have been booted. A system will reset down to a default after some time passes (GMs call) that the hacker will haev to wait at least a few minutes (if not hours or days) before this happens.
 +
 +
The system might also send an alarm (if connected to a larger Host system) about the hacking attempt. For Network Hosts this might mean added security procalls (like an increase in the Firewall rating and/or IC programs being dispatched/activated etc.). How fast and how much security is dispatched depends on the Host Security Tier.
 +
 +
Once a Decker has gained Access to the system or device she has a number of options that she can peruse. These requires a new Action and an Opposed Hacking check (with the host or users Firewall acting as a bonus to this roll). If the host wins it makes a basic Smarts check. If successful it boots the Decker out of the system as normal. If the Decker wins he could shut down one basic system (like a comlinks broadcasting of a comlink or a single piece of cybernetics such as not allowing a smartgun linked weapon to fire, etc.) Another option would be to flood the user’s spam AR such that they are Distracted (and Vulnerable if the attacker got a raise over their opponent with the contested check; see SWADE pg. 100). The Decker could also use any Program they have against the device.
 +
 +
For Network Hosts once a Decker has gained Access to the systems first Tier of security she has more steps to gain greater access to the system. 
 +
 +
An important note here is that a Host Systems Firewall acts as a penalty for a Decker's Hacking (or other real world skills), all Persona Matrix skills, and all Program contested or otherwise skill checks. It also acts as a bonus for all Host Systems stats and skills, and all IC programs operating in the system. 
 +
 +
 +
To gain access to a Security Tier the Decker uses Programs to fool or trick the Host's security AI or she can attack it to smash through the Tier to 'beat the Host into submission' as it where. Once the decker has Access to that Tier's Tier she could do data-searches, corrupt a system or its data, destroy data-files, etc. A Decker who wish to access some datafile or information on a high Security Tier, also has to break through the lower Tier's security system and gain Access first. However its done, once the Decker had Access they can move higher in the security Tier. See Common Decker Programs below to see how they might go about gaining Access to that Tier.
  
 
=== Intrusion Countermeasures (IC)===
 
=== Intrusion Countermeasures (IC)===

Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see RPGnet:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)