Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Network Intrusion Countermeasures Program

Status
Not open for further replies.

AfrikaFlag.png

InfoLine.png

  • Intent: A network security program to protect technology from splicers.
  • Image Source: Not Applicable
  • Canon Link: Not Applicable
  • Permissions: Not Applicable
  • Primary Source: Not Applicable
InfoLine.png

InfoLine.png

  • HoloNet Wall
  • Customer Support Hotline
  • Program Installation Screening
  • Universal File Encryption/Decryption
  • Intruder Diagnosis
  • Spam Filter
  • Cross-Platform Capable
InfoLine.png

  • Splicer Ping: If an intrusion is detected, a network bot similar in design to the next-to-be-mentioned Killbot will attempt to trace and ping the intrusion's physical point of origin, making the intruder's real world location visible to Nakaioma Cyber Security whom can then contact either government authorities or if the customer in question is hiring other Nakaioma Security Services- dispatch a security team to the location. Users can also choose to simply be informed about the location themselves, and take matters into their own hands.
  • Killbot: Programmed to immediately latch onto any unauthorized code which has been detected within the network, this Killbot will install malware into the code, forcing the would-be intruder to either delete their program or let the malware render their program and entire system unusable and irretrievable.
  • Highly Modular: Open to third party programs and user modification, the Network Intrusion Countermeasures system offers great amounts of user freedom and significant ease of implanting new protocols and policies for the program to follow. Enabling them to make their NIC as relaxed or as strict as they would like, or even add entirely new features.
  • Internal Monitoring: For corporations, governments and other groups, the NIC will actively monitor users within the network itself, pre-emptively securing the entity in question from any insider threats. NIC also enables specific protocols and authorizations to be given to employees based on rank, ensuring only those who are supposed to access sensitive information or change NIC protocols are able to.
  • Active Measures: So long as NIC is enabled, it will persistently check every file and monitor every single input and output that goes between the network and the 'outside world'. Protected by an impressively vigilant and near impenetrable Border Program which as the name suggests is incredibly effective at finding unauthorized and illegitimate code and attempts at network intrusion.
  • Smart Learning: Not simply relying on pre-established protocols and policies dictated to it by either the user or the design team. The NIC utilizes superior machine learning by actively adapting in real time to new intrusion techniques and programs based on prior experience and the experiences from other NIC programs due to its connection to Nakaioma Cyber Security databases. A splicer attempting to get through the NIC is less like trying to get past a wall, and more like trying to get past a wall while guard dogs are chasing you.
  • Cross-Platform: Not restricted to just the user's computer or ship networks, any number of devices can be added to the program's security umbrella simply by installing NIC onto the devices in question. Ensuring that no matter where the user goes, their electronics will be secure from any kind of splicing.
  • Communication Encryption: Something to be assumed regarding a program like this, any user who has installed NIC can safely communicate both in message and verbal form with anyone else who has NIC installed. For example, two computers within the same corporation that has purchased it, or even two individuals who both happen to have it.
InfoLine.png
  • Hardware Performance: Due to the constant and extremely busy searching which NIC programs are engaged in, checking and double-checking every last file and line of code on both the soft and hardware of a user's network, their performance will take a hit. Much of the time not particularly noticeable to the layman, to tech experts it will be irritating and at times, such as during periods of high volumes of traffic flow, it will become quite noticeable to anyone.
  • Nakaioma Standard: Like any marketable piece of software, the fact that NIC is not unique to one person or one very small group of people means that across the galaxy, there will undoubtedly be a few splicers who will eventually grow accustomed to the program. Although its modular nature allows talented users to improve on it and semi-annual updates ensure that it never lags behind the current trends, there will be periods of time between this where the NIC will not be operating at peak efficiency, opening it up to skilful splicers.
  • External Communication: Though it provides state-of-the-art encryption to internal communications, the NIC does not provide suitable security to outgoing communications, IE to someone who does not have their own NIC installed, as it goes beyond the program's umbrella of responsibility. Nakaioma Cyber Security highly recommends ensuring your contacts also have the software purchased, to confirm maximum security.
InfoLine.png

The frontline product of Nakaioma Cyber Security; a division of Nakaioma Security Services, the Network Intrusion Countermeasures program is the corporation's current poster child in the realm of cyber security. Developed in the 850s strictly for in-house protection, NIC went through several incarnations and upgrades before being released to the public. Advertised and sold to both individuals, as well as large corporate and government entities, NIC has found universal use across the galaxy for a variety of different organizations and purposes. Originally only updated once a year, the frequency of updates and the number of changes made or features improved upon with each update have increased as the number of customers has risen. Recognizing the danger of allowing NIC to proliferate so widely, namely that splicers will grow used to the system, NCS plans to begin releasing quarterly updates in-order to keep ahead of those who would attempt to intrude.

Backed by top of the line machine learning, allowing each individual instance of the NIC to develop its own unique tactics and countermeasures to the intrusion programs used against it, NIC is constantly changing, with the primary NCS database to which all instances of NIC are connected to in some sense becoming its own form of hivemind given the frequency in which it learns and develops its strategy against splicers and their malware. Several variants of NIC exist for customers of different requirements and price ranges, with the most commonplace being very barebones versions of the fully-fledged system which is most often advertised, only including the basic firewalls, anti-virus and spam filter type programs. These are usually sold to your everyday customer or small business. While NIC in its intended form is most often sold to large corporations, certain government agencies and particularly discerning individuals, each with their own sensitive information to protect.
 
Last edited:
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom