Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Breshig War Forge Consolidated 'Morut'yc' Security System

Status
Not open for further replies.

Shuklaar Kyrdol

CEO of Breshig War Forge Consolidated

y43pnZR.jpg

OUT OF CHARACTER INFORMATION
  • Intent: To create an advanced security system for use on both starships as well as secure installations.
  • Image Source: N/A.
  • Canon Link: N/A.
  • Permissions: N/A.
  • Primary Source: N/A.
PRODUCTION INFORMATION
SPECIAL FEATURES
STRENGTHS
  • Comprehensive Scanner/Sensor Coverage and Capability: When the system is installed, almost every inch of the facility/ship that it is installed in is blanketed by overlapping sensors and scanners, all of which are designed to cover a variety of different roles as part of a larger sensor net with the intention of making the chance that something is able to slip past tend as much toward zero as is possible.
  • Defenses for Every Occasion: Between the various stun systems, deflector shielded doors, the enclision grids, the gas dispersal systems and the turrets, there isn't really a threat or an escalation of force the system isn't capable of matching save for an attack on the outside of the facility/ship, which it most certainly was not designed to defend against.
  • Secure: Great measure has been taken to protect the system against the threat of slicers. Multiple redundant physical security measures augment a socketguard, and an echo pulse is also installed to potentially stop slicers before they can cause too much harm. If the system detects that none of the measures have worked, it will activate its magnetic pulse wiper and destroy the terminal the slicer is attempting access through.
  • Self-Managing: The system requires very little if any oversight at all. Once installed and up and running, it will monitor all its components and notify personnel of any and all situations, from security alerts to maintenance reminders.
WEAKNESSES
  • Inside Job: Like with most security systems, if given access by someone on the inside, there is little way to stop intruders and infiltrators.
  • Advanced Stealth Tech: Advanced stealth tech is simply far too advanced for any of the systems' sensors/scanners to pick up easily. Though the infiltrators will still have to exercise caution, careless practices may well still give them away.
  • Hull Scrubber: Hull scrubber cannot be employed while battlefield repairs are being conducted.
  • Sealed Suit: The entire arsenal of weaponized gasses are largely useless against targets with fully sealed suits.
  • Slicers: No system is perfect, and truly talented slicers may well be able to find an exploit in the security that the company has is as of yet still to patch.
DESCRIPTION
"Does it make caf too?"
- Strill Securities Ori'ha'aratr Aran Netra
Designed by Breshig War Forge Consolidated to more easily facilitate the streamlining of all their security protocols, the 'Morut'yc' Security System is since in widespread use across the company's installations, stations and starships. The number one requirement of the system was that it should be largely automated to prevent security personnel from having to involve themselves with the banal day-to-day of manning a system of this nature, but at the same time it needed to be able to not only tackle intruders on its own but inform security personnel as and when security threats crop up.
At the core of the system was an extremely powerful supercomputer that handles the day-to-day operation of the system, requiring outside interference only for maintenance. The system is fully capable of analyzing threats and determining what level of a response is required. The system is fully capable of heuristic learning, and as a result only develops better responses to various threats the more it faces them. For all tasks requiring organic or inorganic security or maintenance personnel, the system will automatically alert the necessary personnel via the internal security network, which is equipped with heavily encrypted standard and holocom systems, as well as a comm laser for interference free, interception resistant communication.
For instances when manual override is necessary, there are security terminals which feature a variety of security features to prevent an infiltrator or intruder from easily gaining access to the system once they have access to a terminal. However, the system has no real way to prevent someone with access from shutting it down, though access to said terminals are usually limited to higher ranking members of said facility's security, or to higher ranking members of a ship's crew. To protect the terminals from misuse by infiltrators and intruders, access is protected by an IFF/Identichip scanner, code cylinder reader, retinal scanner and vocal analyzer. Additionally, because of how vulnerable a fully automated system like this could potentially be to a slicing attack, a number of counter slicing measures are put in place to potentially prevent such an attack from succeeding.
The sensors and scanners used by the system to detect and tracks security breaches are all configured as a sensor net, allowing the system to use their overlapping fields and differing capabilities to get the most complete and accurate 'picture' of the location it is supposed to be monitoring, meaning that save for advanced stealth technologies, it is unlikely that any potential intrusion/infiltration attempt will go unnoticed. Additionally, even in the case of advanced stealth technologies, careless behavior can potentially result in the system becoming alerted to their presence, even if it will not be able to track them.
The system does however, track all personnel, and cross references all entities it detects with its personnel database to ensure there are no infiltrators or imposters. The system also tracks weapons and explosives in use by the above as well. The system also makes use of force-detecting chips installed at each entrance to identify force users not deliberately and carefully masking their presence, and tags them so that security personnel are aware of their presence. A hyperwave signal interceptor and a communications scanner give the system the ability to identify unauthorized communications, and given time triangulate its position such that security personnel may be directed to address the situation.
As far as security measures are concerned, the system is equipped with a variety of security systems. The system defaults to alerting security teams via the security net, and will not actually raise any alarms unless the system determines that the threat is big enough to do so. Once it determines this to be the case, it evaluates the threat and raises an alarm appropriate to said threat. To deal with said threats, gas dispensers and stun steps are in widespread use. Unfortunately, should the attackers be equipped with sealed suits, the gas dispensers would be rendered largely ineffective. Turrets are installed at every entrance, bulkhead, choke point, entrance and inside all important rooms/sections. Enclision grids secure the high security and restricted access hallways/corridors.
Blast doors are placed at every entrance/exist, bulkhead and entrance to all important rooms or sections, and are magnetically sealed and protected by deflector shield. The doors themselves are made from turadium, with an agrinium lining and reinforced duraplast plating. Should the doors be forced open, a shock field activates on either side of the door. The doors are access restricted, with the security measures increasing in number and complexity as the importance of what lies ahead of it increases.
The system can also has provisions to deal with other hazards, such as fires, hull breaches and loss of pressurization from hull breaches and high levels of radiation.
Finally, in the case of extreme measures, the installation commander or ship captain can initiate a systematic self-destruct of all critical systems to prevent them from falling into enemy hands. At which point, naturally, the system has failed at its intended purpose.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom