Computer
A computer can be any technological device that can be instructed to carry out an arbitrary set of arithmetic or logical operations automatically. Computers can also store, sort, and manipulate data.1 They are modular, upgradable devices that can run software, interact with systems, operate starships, and hack other devices.2
Interfaces
Available in a wide variety of forms from tiny wearable or implantable devices to datapads, laptops to workstations, and even space station-scale control units, computers are as diverse as they are ubiquitous. A door lock, lightning controller, and comm unit can all be computerized.2
Computers often have a user interface in the form of a control module that provides an output device (such as a display) and input device (such as a keyboard). Other interfaces allow for audio and gesture interactions.2 Users with a datajack can connect to some types of computers directly, either by plugging it into the datajack or via cabling.3
Components
A computer is comprised of several components:
- Modules
- Modular components combine hardware and software to provide interfaces for controlling computers, storing secure data, casting stored spells, and add or improve functionality.2
- Countermeasures
- Tools with which a computer can protect itself against unauthorized access or hacking.4
- Data
- Information that can be stored on a computer for rapid modification, sorting, and retrieval.2
Access and authentication
Unsecured systems grant anyone who can access the computer unfettered permission to view data or activate its connected functionality.5 It is often trivial to determine whether a user's access to a computer is unsecured.1 However, most computers gate some or all access behind three layers of security:
- Authorization
- A user account exists on the computer and is granted certain permissions to access data or modules in the system.1
- Security key
- An authorized user verifies their identity through possession of a physical object, such as a keycard. The security object might also be biometric, such as a user's palm print or retina, or another computer.1
- Password
- Most passwords are long strings of characters entered using a keyboard, but they can easily be the user's unique voiceprint, a telepathic command, or a song or riddle.1
Administrative users with root access to a computer can easily modify what a user has permission to access and revoke existing access, or can require new keys or passwords if they detect that they are used fraudulently.1 Countermeasures and firewalls gate or protect parts of a computer from unauthorized access by hackers.4
Less powerful workstations or devices connected to a more powerful computer have limited access to the more powerful device.26
On starships
Many starships rely on computers to manage or assist with the complex task of operating a spacecraft. Most starship computers include an artificial personality, and some ship crews believe that such personalities develop unique behaviors over time.7
References
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 Core Rulebook, 214. Paizo Inc., 2017 .
- ↑ 2.0 2.1 2.2 2.3 2.4 2.5 Core Rulebook, 213. Paizo Inc., 2017 .
- ↑ Core Rulebook, 209. Paizo Inc., 2017 .
- ↑ 4.0 4.1 Core Rulebook, 217. Paizo Inc., 2017 .
- ↑ Core Rulebook, 138. Paizo Inc., 2017 .
- ↑ Core Rulebook, 215. Paizo Inc., 2017 .
- ↑ Core Rulebook, 297. Paizo Inc., 2017 .