Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech EI-10 Network Security Droid

Status
Not open for further replies.

Arken Lussk

Thrills, Chills, and Kills
EI-10 Network Security Droid
aegis_10.png


[ Image ]

OUT OF CHARACTER INFORMATION
  • Intent: To provide the open market with an advanced, highly capable network security droid.
  • Image Source: Here
  • Canon Link: N/A
  • Restricted Missions: N/A
  • Primary Source:
    EI-9 Network Security Droid

PRODUCTION INFORMATION
  • Manufacturer: Aegis Systems
  • Model: EI-10 Network Security Droid
  • Production: Mass Produced
  • Affiliation: Aegis Systems, Open Market
  • Modularity: Software updates; aesthetic modifications.
  • Material: Dura-armor plating, durasteel frame.
TECHNICAL INFORMATION
  • Classification: Fourth Degree
  • Weight: 100kg
  • Height: 1.7m
  • Movement: Bipedal
  • Armaments:
    [Programming to use handheld weaponry; handguns, rifles.]

[*]Misc. Equipment:

SPECIAL FEATURES
  • Heuristics
  • Advanced Security Measures
Strengths:
  • [+] Heuristic: A heuristic central processor, lots of memory, and advanced security programming makes this bot one tough cookie. It can learn on the fly and is quite adept at estimating the avenues of approach when it comes to slicing.
  • [+] Advanced Security Measures: Hardened pyrowalls, socketguards, snoopers, scomp-spikes. The EI-10 has the whole nine yards. It'll take a savant slicer or a team of well trained slicers to get past fortified network defenses.
Weaknesses:
  • [-] Physical Security: While the EI-10s have the programming and capacity to resort to physical aggression as a means of protecting assets, they're not the best at the job. They're rather subpar even compared to galactic security droid standards.
  • [-] Computer Spikes: These nifty little devices can get past most of the EI-10's security measures very quickly, but use them wisely.
  • [-] Inherent Weaknesses: EMP and ionic weaponry devastate these droids.
DESCRIPTION

Taking their next steps into network defense and security is Aegis Systems' premier network security device: the EI-10 Network Security Droid. Bearing ancestry to the archaic EI-9, the 10 is the next step in securing your information systems and other valuable virtual assets.

Standing at about average human height, the EI-10 is a lean and lanky droid. Top heavy from the processors and internals within its torso, it's framed with durasteel and has a minute layer of dura-armor covered its most important components. On the inside, the EI-10 boasts the best heuristic processor on the market, a gabonna memory crystal storage unit, as a plethora of other security components.

The most notable security devices the EI-10 possesses are the Rapid Repetition Defense Measures, Probability Software, and a Scomp-Spiker. The RRDM is a mechanism that provides constant monitoring and intrusion detection capabilities to whatever system or network the EI-10 is interfacing to, providing that first layer of defense. The Probability Software works directly in conjunction with its heuristic processor to constantly learn, adapt, and notice patterns in data flow that bear the telltale signs of system/network intrusion and exploitation. This allows the EI-10 a greater level of vigilance in both wired and wireless networks. And lastly, the Scomp-Spiker is a device that provides the capacity to remotely terminate connections and foreign programs, effectively shutting out intruders.

The other components are secondary ones. Most allow the droids administrative roles in the systems or networks they operate in, the ability to interface with a multitude of systems, and otherwise secure the networks they're safeguarding.

However, most of these measures can be subverted through the usage of security spikes. These devices allow attackers to stealthily infiltrate networks without tripping most intrusion detection systems and some variants can even grant elevated permissions. The heuristics and probability software was Aegis Systems' counter to this flaw, but even the greatest NetSec droid can't stop a determined and talented slicer.

All in all, the EI-10 is the absolute best network security droid on the open market. Robust, versatile, and well equipped to safeguard any assets in cyberspace. Get yours today!
 
Last edited by a moderator:
Under Review.

What can you tell me about this droid's ionic resistances. In particular, can you elaborate on this sub's weakness of computer spikes? What would happen if an operative used on on this model? Would it just purge its data and circumvent any attempt at recovering said data?

[member="Arken Lussk"]
 

Arken Lussk

Thrills, Chills, and Kills
[member="Nadja"]

I was on an LOA.

[member="The Major"]

Ionic weaponry is an inherent droid weakness unless stated otherwise.

Computer spikes allow the bypassing of the RRDM and some other automated security measures. However, its use in flooding the system/network with garbage data in a DoS entry style, that'll definitely be noticed by trained personnel or the EI-10. Using a computer spike just circumvents most security measures and allows an attacker more time to operate. In the event that an assailant does get past, most EI-10s encrypt the targeted data before deleting it.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom