Computer Systems
Whether you want to hack for information or rewrite security protocols, you will use the Computer Ability.
Computer systems are divided into types, and each system type has a number attached to it. This number is used in a contested test if the hacker fails (the system versus the hacker’s Reaction + Computer), and represents the system’s defence mechanism (this is the defensive pool of the system).
If the computer wins, it has traced the hacker. The hacker also suffers -2 on his next try as the system has upgraded itself (however, if the hacker spoofed the system beforehand, the trace and the negative modifier doesn’t apply the first time he fails). The reset time shows how long it takes for the system to let its guard down again after the hacker has left the system. The AI decides how advanced a defensive system is, in order to determine the defensive pool. Usually, it runs from a pool of 3, for simple systems, to a pool of 8 for the most advanced.
Simple and standard systems, found in low security municipal institutions and in home networks, seldom have a defensive mechanism of this nature. When the hacker is inside, the system does a cycle every 1-10 minutes depending on the level of security. Each cycle, a new contested test must be made. If the system wins, it locks out the hacker and only after the reset time has run out will the hacker be able to try again.
Simple System Type = 10 min Base Time | 2 min Minimum Time | 2 min Reduction Time | 2 min Reset Time
Standard System Type = 20 min Base Time | 10 min Minimum Time | 2 min Reduction Time | 3-6 min Reset Time
Advanced System Type = 40 min Base Time | 20 min Minimum Time | 5 min Reduction Time | 6-10 min Reset Time
Note on computer systems: Computer systems can be used to tap into information, take control of things such as docking procedures and a variety of other systems. However, security alarms, cameras and doors are seldom connected to the overall computer system, and in most cases you must access these things directly, using security panels. Many systems are divided into subsystems, which means that there is seldom a way to take over an entire ship or space station by accessing a mainframe. For example, a ship’s mainframe can be used to tap into about ninety percent of the ship’s relevant information (camera feeds, propulsion systems data and the like), but can only be used to control about a third of the systems at best. And a lot of information (secure files) must be hacked into separately. First, the main system needs to be hacked and then the sub-filing system must be breached.
Example: Operative Eric Starkwood is hacking away at the shipping manifest database on a D-class freighter. The system is a standard one, which gives it a base time of 20, minimum time of 10 minutes, reduction time of 2 minutes and a reset time of 3 (the AI went for the minimum) minutes. The AI has decided that the system is a bit beefed up; it has a defensive pool of 5 and it also does a cycle every five minutes. Eric has a total pool of 6 (Brains + Computers). He scores three successes, reducing the time by a total of 6 minutes. Thus, it takes him 14 minutes to get inside the system. He downloads some information and after five minutes the system does a cycle. This means that Eric has to beat or match the system’s defensive pool of 5 in a contested roll. The roll is made, but the system wins by one success. It locks him out and Starkwood can’t attempt a hack until the reset time has run out, but the system probably traced his access point on the ship. He won’t get another chance right now with a security force on its way, but he got hold of some of the information he was after.
Computer systems are divided into types, and each system type has a number attached to it. This number is used in a contested test if the hacker fails (the system versus the hacker’s Reaction + Computer), and represents the system’s defence mechanism (this is the defensive pool of the system).
If the computer wins, it has traced the hacker. The hacker also suffers -2 on his next try as the system has upgraded itself (however, if the hacker spoofed the system beforehand, the trace and the negative modifier doesn’t apply the first time he fails). The reset time shows how long it takes for the system to let its guard down again after the hacker has left the system. The AI decides how advanced a defensive system is, in order to determine the defensive pool. Usually, it runs from a pool of 3, for simple systems, to a pool of 8 for the most advanced.
Simple and standard systems, found in low security municipal institutions and in home networks, seldom have a defensive mechanism of this nature. When the hacker is inside, the system does a cycle every 1-10 minutes depending on the level of security. Each cycle, a new contested test must be made. If the system wins, it locks out the hacker and only after the reset time has run out will the hacker be able to try again.
Simple System Type = 10 min Base Time | 2 min Minimum Time | 2 min Reduction Time | 2 min Reset Time
Standard System Type = 20 min Base Time | 10 min Minimum Time | 2 min Reduction Time | 3-6 min Reset Time
Advanced System Type = 40 min Base Time | 20 min Minimum Time | 5 min Reduction Time | 6-10 min Reset Time
Note on computer systems: Computer systems can be used to tap into information, take control of things such as docking procedures and a variety of other systems. However, security alarms, cameras and doors are seldom connected to the overall computer system, and in most cases you must access these things directly, using security panels. Many systems are divided into subsystems, which means that there is seldom a way to take over an entire ship or space station by accessing a mainframe. For example, a ship’s mainframe can be used to tap into about ninety percent of the ship’s relevant information (camera feeds, propulsion systems data and the like), but can only be used to control about a third of the systems at best. And a lot of information (secure files) must be hacked into separately. First, the main system needs to be hacked and then the sub-filing system must be breached.
Example: Operative Eric Starkwood is hacking away at the shipping manifest database on a D-class freighter. The system is a standard one, which gives it a base time of 20, minimum time of 10 minutes, reduction time of 2 minutes and a reset time of 3 (the AI went for the minimum) minutes. The AI has decided that the system is a bit beefed up; it has a defensive pool of 5 and it also does a cycle every five minutes. Eric has a total pool of 6 (Brains + Computers). He scores three successes, reducing the time by a total of 6 minutes. Thus, it takes him 14 minutes to get inside the system. He downloads some information and after five minutes the system does a cycle. This means that Eric has to beat or match the system’s defensive pool of 5 in a contested roll. The roll is made, but the system wins by one success. It locks him out and Starkwood can’t attempt a hack until the reset time has run out, but the system probably traced his access point on the ship. He won’t get another chance right now with a security force on its way, but he got hold of some of the information he was after.
Remove these ads. Join the Worldbuilders Guild




Comments