I've been playing this edition for 4 years now and still, for the life of me, I don't know how the Matrix really works. How about I give you my interpertation of the rules and someone fills in the blanks? Or maybe points me to a quick guide? I have the Matrix Crib Sheet, but this only serves to tell me what is rolled when, it doesn't tell me how to navigate the place or how to build a system.
So, I want to have an apartment building for my runners to go into. Don't worry about why, I just want them in this building. I say that the security is kind of tight. They have pass-key entry into the building on all sides and have the doors watched by cameras. I also have camera arrays on the inside of the building as well to watch hallways. There's also a database with information on the residence, payment and rent information, phone numbers, ect.
This isn't a small-time rental slum, so the security should be around A level on the node. I'm saying that the system is a rating 6 with a signal of 3 outside of the building. Firewall would be 5 and Response would be 6 (Please tell me if these numbers don't make sense for the kind of thing I have going).
Your friendly local hacker needs to find some personal information on a particular subject that happens to rent at this apartment. He sits in a local coffee shop about a block away from the place and goes in to probe the target. He knows he'll need at least security access to the apartment complex and he'll need it for a few days, so he takes the long route and probes for holes. He would roll his Hacking + Exploit program for each hour he's probing and he needs an extended test of System + Firewall + Security Access (14) to break in and register an account on the system's computer. After about 6 hours, he gets the hits he needs and is able to push his way in. On the login, the system makes an Analyze + Firewall (11, assuming the program ratings are the same as the system's rating) vs the hacker's running Stealth program (5). Assume the system fails and the person logs in.
At this point, the hacker is logged into the node, I assume, and can see everything the node facilitates. He'll see a bank of TV screens for the cameras, switches that control the MagLocks in the building, and a filing cabinet that holds all of the records that he needs. Say he wants to put a tap into the cameras in the building and route the info to his home mainframe for analysis. He also wants to make a quick search in the system's file records for the name that he's looking for and the info on them.
What types of checks are each of these, how many checks do they needs, what are the successes needed, how would the system respond, ect. This is where I get lost, obviously. Also, are each of the cameras just a device subscribed to the main node? The same with the Database and MagLocks?