Countermeasure
Countermeasures encompass a broad group of computer security features designed to mitigate the risks presented by hackers and other unauthorized users. Simple countermeasures simply prevent access or disconnect the user from the computer, but more complex ones can direct robotic defenses or even deal direct physical harm to the intruder.1
Known countermeasures
- Alarm
- After detecting an intrusion, an alarm notifies a user or station of the event, and can also activate an alarm system, robot, weapon, or other device that the computer can control.2
- Fake shell
- A fake shell presents false data to a user without root access.32
- Feedback
- This countermeasure transmits a virus to the intruder's system that disrupts its functionality.2
- Firewall
- A firewall is a special countermeasure that gates root access to certain parts of a system.2
- Lockout
- After a certain number of failed access attempts (typically three), a lockout countermeasure can act as an alarm while also disabling all access to the system.2
- Shock grid
- A grid of electricity-conducting material around the computer activates when a user fails to gain unauthorized access to the system. A shock grid can emit a shock powerful enough to either stun or kill most creatures.2
- Wipe
- When activated, a wipe deletes data from connected data modules. The deleted data might be recoverable unless the physical data module is also destroyed. Most wipe countermeasures are configured to activate after at least two failed authorization attempts.2
Manipulation
Countermeasures can be activated or disabled intentionally by a user with root access, or by a hacker with access to the computer. The process often takes only a few seconds.4 Users with root access can also set conditions on when countermeasures are applied.1
References
- ↑ 1.0 1.1 Core Rulebook, 214. Paizo Inc., 2017 .
- ↑ 2.0 2.1 2.2 2.3 2.4 2.5 2.6 Core Rulebook, 217. Paizo Inc., 2017 .
- ↑ Core Rulebook, 138. Paizo Inc., 2017 .
- ↑ Core Rulebook, 139. Paizo Inc., 2017 .