Countermeasure

From StarfinderWiki

Countermeasures encompass a broad group of computer security features designed to mitigate the risks presented by hackers and other unauthorized users. Simple countermeasures simply prevent access or disconnect the user from the computer, but more complex ones can direct robotic defenses or even deal direct physical harm to the intruder.1

Known countermeasures

Alarm
After detecting an intrusion, an alarm notifies a user or station of the event, and can also activate an alarm system, robot, weapon, or other device that the computer can control.2
Fake shell
A fake shell presents false data to a user without root access.32
Feedback
This countermeasure transmits a virus to the intruder's system that disrupts its functionality.2
Firewall
A firewall is a special countermeasure that gates root access to certain parts of a system.2
Lockout
After a certain number of failed access attempts (typically three), a lockout countermeasure can act as an alarm while also disabling all access to the system.2
Shock grid
A grid of electricity-conducting material around the computer activates when a user fails to gain unauthorized access to the system. A shock grid can emit a shock powerful enough to either stun or kill most creatures.2
Wipe
When activated, a wipe deletes data from connected data modules. The deleted data might be recoverable unless the physical data module is also destroyed. Most wipe countermeasures are configured to activate after at least two failed authorization attempts.2

Manipulation

Countermeasures can be activated or disabled intentionally by a user with root access, or by a hacker with access to the computer. The process often takes only a few seconds.4 Users with root access can also set conditions on when countermeasures are applied.1

References

  1. 1.0 1.1 Paizo Inc., et al. Core Rulebook, 214. Paizo Inc., 2017
  2. 2.0 2.1 2.2 2.3 2.4 2.5 2.6 Paizo Inc., et al. Core Rulebook, 217. Paizo Inc., 2017
  3. Paizo Inc., et al. Core Rulebook, 138. Paizo Inc., 2017
  4. Paizo Inc., et al. Core Rulebook, 139. Paizo Inc., 2017