Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Ready For Judge MAZE Network Security Matrix

Corvus Spire

Novean Technologies CEO
Novean Technologies
MAZE Network Security Matrix
tunnel-4520819_1280.jpg

OUT OF CHARACTER INFORMATION
  • Intent: To create a network security system for use on Corvus' Kardashev II Research and Development Starship
  • Image Source: Pixabay
  • Canon Link: N/A
  • Permissions: N/A
  • Primary Source: N/A
PRODUCTION INFORMATION
  • Manufacturer: Novean Technologies
  • Affiliation: Novean Technologies
  • Market Status: Open-Market
  • Model: N/A
  • Modularity: No
  • Production: Mass-Produced
  • Material: Server Stacks and Components, Software, Heatskin Components
SPECIAL FEATURES
  • Blackwall - Non-authorised code and access attempts are immediately and violently expunged this can cause Cyberwarfare suites to temporarily crash. Additionally, any files or malware used is lost the further delaying network access attempts.
  • Isolated Sub Systems - Any Capital Ship fielding this technology cannot be completely disabled by a Cyberwarfare suite, at least not immediately. While it's possible to access the central node these are usually hardwired into the system requiring direct access. MAZE in particular usually exists in a vacuum or surrounded by coolant.
STRENGTHS
  • Effectively delays hackers and splicers.
  • Counters most Cyberwarfare suites that target starship systems and subsystems.
WEAKNESSES
  • Overheat - MAZE server stacks process lots of traffic, they must be cooled requiring a significant amount of space. Cooling methods usually include Heatsinks for smaller Capital Ships and Submerging in Coolant or natural heat absorbers (water for example). If overheated the subsystem may shut down.
DESCRIPTION
MAZE is a military-grade network security solution. It works by segmenting various systems and subsystems across the ship's mainframe and routing traffic through various network nodes that function as gateways. Any data authentic or otherwise that attempts to bypass these nodes are immediately expunged.

Data that travels through these nodes provides an encryption key that grants access. These keys are fully automated and refreshed every hour, with a 5 minute grace period. While this does not prevent slicing or other cyber warfare techniques, it prevents any single subsystem from exposing the Ship completely.

For example, a cyber warfare suite may temporarily disable weapon systems but it cannot then spread to life support at least not without direct access to the core node. In the event, a false key is detected, the afflicted area is locked down and an automated sweep cleanses the affected system of anomalous data, before restarting usually within 3~5 minutes.
 

Users who are viewing this thread

Top Bottom