IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> I'm designing a very low-end home net, Can you look over my security sheaf?
ShadowDragon8685
post Jul 13 2005, 07:37 AM
Post #1


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



CODE

A C I F S
Blue 4 - 6/4/4/5/4 Host (Easy)
Matrix 3.0 Rules

Security Sheaf Table

Trigger Step   - -   Security Event
007               - -    Probe 3
012               - -    Probe 5
017               - -    Probe 7
024               - -    Tar Baby (Analyze) 6 / Binder (Evasion) 4
031               - -    Passive Alert (+2 on all Subsystem Ratings)
036               - -    Killer 4 / Tar Pit 4 Attack
041               - -    Ripper (Evasion) 4
047               - -    Blaster 5 / Probe 7
053               - -    Blaster 7
058               - -    Active Alert - Killer 2 / Killer 2 / Killer 2 / Blaster 4
065               - -    Blaster 4 / Blaster 4
072               - -    Crippler (Bod) 5 / Sparky 6
077               - -    Black IC 4 / Tar Pit (Attack) 4
084               - -    Shutdown Started


Paydata Table
Data Size               - -    Defense
160 Mp               - -    Scramble 2
200 Mp               - -    Scramble 2
120 Mp               - -    No Defense
200 Mp               - -    Scramble 2
Run Info             - -    No Defense



This is supposed to be a milk-run datagrab, and it has some Run-relavent info in it. It's supposed to be the home network of a low-midling executive at a megacorp (I haven't decided which.) Yes, this is the home network of the guy from the de-gaying camp rescue Run.

Note: I've designed it with the SR3Decking rules revisions (featured in This Thread in mind. I want it to be a bit challenging, but overall a milk run. The players (and the DM, for that matter,) are matrix-run virgins.
Go to the top of the page
 
+Quote Post
Birdy
post Jul 13 2005, 09:12 AM
Post #2


Moving Target
**

Group: Members
Posts: 637
Joined: 26-February 02
Member No.: 1,528



Drop the black ICE. AntiPersonal Programs are IMHO a NoNo outside a AAA host.

Birdy
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Jul 13 2005, 09:22 AM
Post #3


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Whoops. I forgot about that.

I could say he lives in a corporate enclave...

Meh, I'll just replace it with Sparky. Good catch, thanks. :)
Go to the top of the page
 
+Quote Post
Crusher Bob
post Jul 13 2005, 11:25 AM
Post #4


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



If you are actually going to play out the run with your decker, better add some more milk run stuff for the rest of the team here too.

I notice that the system dosen't 'call the cops' I would think that it would do so fairly early, call up the corp systems that have some real computing power and get them to run some much better trace programs that what the execs relatively feeble desktop can run.

So change the security sheaf to look like this:

Tally ~20
Call corp system, ask for 'trace ~6-7', if call is unsuccesful (line cut is probably cut, goto active alert), then all the IC over rating 3 or 4 is acutally being run by the large corp systems, not the simple home system.

This will in theory give the regular team members something to do, they can cut the phone line to greatly reduce the IC available to the home system, but then it's more likely to go on alert/shut down. Or they can try to spoof the outgoing call, so that the system thinks it's getting the support it's asking for, but isn't.


Otherwise it becomes a much better deal to just break into the guys house and make off with his PC, it has all sorts of moby IC on it, which will undoubtedly sell for a lot more than you are being paid.
Go to the top of the page
 
+Quote Post
hobgoblin
post Jul 13 2005, 12:35 PM
Post #5


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



black ice for a home system? sounds like a paranoid user to me :P
hell, even gray ice may be over the top...
Go to the top of the page
 
+Quote Post
Jrayjoker
post Jul 13 2005, 01:36 PM
Post #6


Neophyte Runner
*****

Group: Members
Posts: 2,453
Joined: 17-September 04
From: St. Paul
Member No.: 6,675



Seems reasonable. Except the black IC as noted previously.

What deck and utilities does the decker have?
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Jul 13 2005, 04:19 PM
Post #7


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Jray - I don't know yet. That's the problem. I don't even know IF we're going to have a decker at all.

That's why I'm designing it as a home invasion, and they can also get the mission data off the home telecom. It's not just a straight datasteal - they need to prevent the system from calling Lone Star.

Also, that was what I had envisioned - every IC after Active Alert is actually being streamed to this system by the corp mainframe.
Go to the top of the page
 
+Quote Post
Aku
post Jul 13 2005, 04:31 PM
Post #8


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



i would say put SOME sort of low grade defense on the run info, unless for some reason the guy has appsolutely no reason to think the data is in trouble (say, it's a coded message within mama's home made chocolate cookies)
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Jul 13 2005, 04:32 PM
Post #9


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Aku: The incriminating Run data is simply the logfile of his incoming and outgoing transmissions. He's wiped the contents of the log manually, but he forgot to wipe the numbers.
Go to the top of the page
 
+Quote Post
Aku
post Jul 13 2005, 04:35 PM
Post #10


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



hmm, ok, well, since that doesnt seem like any major info (alone), maybe they wouldnt be...
Go to the top of the page
 
+Quote Post
Edward
post Jul 14 2005, 12:48 AM
Post #11


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



SSG tells us that the typical home telecom is a blue-4 8/8/6/6/6 with a single probe 2 program. But may be improved buy paranoid users at the GMs discretion.

A street dater term is green 4 8/8/8/8/8 with nothing nastier than blaster IC.

The question is how are they going to find the jack address to access a home data terminal. That will require hacking his local telecom grid

I would put scramble IC on the file myself

Edward
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th April 2024 - 08:23 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.