Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Central Command Security Network

Status
Not open for further replies.

Fiolette Fortan

Guest
F
CENTRAL COMMAND SECURITY NETWORK
TgLg1h6.png
OUT OF CHARACTER INFORMATION

  • Intent: To create a security network for the First Order’s military and government

  • Image Source: N/A

  • Canon Link: N/A

  • Restricted Missions: N/A

  • Primary Source: Central Command Biocomm Network (x)
PRODUCTION INFORMATION

  • Manufacturer:

    First Order Ministry of Security

  • First Order Central Command

[*]
Model: FICC SHNIV “CCSN” (Central Command Security Network)

[*]
Affiliation: First Order | Closed-Market

[*]
Modularity: No

[*]
Production: Mass Produced

[*]
Material:

  • Hyperwave Transmission / Reception

  • Biocomm Encryption Module

  • Subspace Communication Beacons

  • Central Command Subspace Area Network

  • Central Command Subspace Workgroup

  • Central Command Wide-Subspace Area Network

  • Auto-Activation Alert Signals

  • Encryption Modules

  • Command Hex-Encryption Modules

  • Random Biocomm Access Memory Storage

  • Redundant Biocomm Memory Array Storage

SPECIAL FEATURES

  • Biocomm based network technology that runs from the main CCBN, works to secure hyperwave transmissions as well as select subspace transmissions.

  • Actively monitors all central command networks while working to send and receive data just as well.

  • Automatically encrypts all hyperwave transmissions with three secure layers of code.

  • Stores memory and keeps an active ‘recent’ memory to recover data from unexpected server shutdowns.

  • Keeps a redundant memory backup system to recover all data from unexpected data wipes and server shutdowns.
Strengths:

  • Biocomm: Utilizes the new biocomm network for high priority transmissions giving it a third layer of security as opposed to the typical two layers from older subspace technology.

  • Encryption: Utilizes three forms of security, two of the more common being regulated to low priority subspace technology.

  • Memory: Has a unique ‘memory’ feature enabling to remember transmissions as well as store important data for later.
Weaknesses:

  • Limited Range: Works only within the range of the CCBN and does not work outside of the network.

  • Server Maintenance: Does go down for routine maintenance and is rendered ‘offline’ leaving it the most vulnerable to would-be slicers and hackers to infiltrate.

  • Vulnerabilities: More so for the subspace side but still vulnerable nonetheless. While the biocomm and hyperwave side of the network is still weak to the CCBN’s typical weaknesses. The subspace vulnerabilities are as follows.

    Viruses: Viruses that work to bring down the server software, phish for data, or otherwise seek to infect numerous systems at once with the intent of either stealing, wiping and/or corrupting data.

  • Overload: Overloading or overwhelming the server causing traffic to slow down, meaning response times are increased. Eventually leading to a server crash which renders it offline and inoperable.

DESCRIPTION
When Kuragin was gone and the Grand Admiral was left to answer for its demise. She devised a new network and worked with Minister [member="Dante Calgar"] on its creation. The Central Command Security Network would be a way for several branches of the government, intelligence and military to get together and communicate. Sharing data, intel and emergency alerts when necessary, for while networks like the EHTN work for all.
The CCSN would give priority alert and intel to Central Command allowing them to act faster and to dictate just who would get an alert from the EHTN. It’s technology is a hybrid combining the new biocomm network and older subspace technologies as seen with the ISCN. The CCSN also allows for Central Command to maintain eyes and ears across the ever expanding empire. With it they are able to monitor all data traffic and live feeds from smaller security networks as well as surveillance networks.
CCSN as mentioned combines new and older technologies, the older of which being subspace. Subspace frequencies and subspace networks such as typical CCSANs (Subspace Area Networks), CCWGs (Central Command Workgroups), and CCWSANs (Central Command Wide Subspace Area Networks). Newer technologies such as hyperwave frequencies, and the biocomm encryption modules.
Biocomm encryption modules are the ‘third’ layer in the three layer encryption codes. And is only applied to high priority alerts through hyperwave transmissions.
All data that flows through the network is snapshotted, a quicktime photo if you will. The network takes a snapshot of data throughout the datas (data packets, bits) journey. It does this so in case there is an interruption or shutdown. It can ‘remember’ the data at any given point in the transmission and resend the data. Temporary data is wiped each night, but data flag as priorities or importance are stored. Data that is stored is backed up through the ‘redundant’ storage arrays. The redundant storage arrays come in either three, five or ten. Where each memory storage array houses its own individual copy of the data.
Both random and redundant memory rely on the biocomm network. That is the biocomm network’s neuro-gel and gel packs. Thus this gives way to the earlier implication that the CCSN combines new and old technologies.
The older technologies such as the subspace communication beacons, hex encryption keys and standard encryption modules are at the very basis of the ‘everyday’ network. Every day thousands if not millions of those employed by the First Order Government, Military and Intelligence agencies utilize this part of the network. Whether it’s to send an encrypted holomail to someone or send low priority alerts. Central Command oversees it all, with dedicated workers who monitor and sift through all the data. Looking for keywords and phrases in which to study and analyze.
Hex keys and typical encryption codes are used in two of the three, encryption layers. With the third being the aforementioned biocomm aspect. Hex keys are randomly generated by the system, and are utilized in both the CCSN and the new ISCN. Encryption modules also randomly generate their own set of codes, typically four sets of four.
The bulk of the network is housed in Avalonia at the Imperial Palace far below Central Command’s main office. The rest of the network is housed within the CCBN’s own modules to enable faster and more reliable speed.
Even with this achievement, the network is not only limited to the range of the CCBN but is also vulnerable to wide array of attacks. From malicious software, viruses and data overload which is a common practice for more ameature slicers. It’s also vulnerable to more antiquated problems such as age, maintenance in the physical sense of maintaining the large server rooms dedicated to it.
The CCSN does go down periodically for maintenance and routine software updates and it is during this period of time that it is most vulnerable and in particular the subspace half of it. The network is down usually overnight when most of the empire’s operations are not on. For ongoing operations it will work in a cascade, shutting down portions of the network at a time.
It is the hope of all those involved with the project that the CCSN will serve to further keep their empire secure.

 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom