System
System measures the power of the device’s operating system (OS)
software. This includes its stability, multitasking properties, ability to
control hardware, resources, and the general quality of its code. If the
System software ever crashes, the entire device crashes. System limits
the rating of programs running on the device, and sets the limit on most
devices for the number of programs that can be run without a Response
drop. The System program is limited by the base Response rating of the
device it is on: if the base Response rating of the device is lower than the
System rating, then the System rating is set to equal the Response rating.
System also sets the size of the Matrix Condition Monitor of persona
programs running on the device (Cybercombat, p. 236).
Sample peripheral nodesI've marked the examples conflicting the rules from the core. I don't care about the fridge, but credstick limited to system 2 and consequently to firewall 2 is a problem.
Device Response Signal System Firewall AR Glove 2 2 1 1 Credstick 2 2 6 6 Fridge 1 3 2 1 RFID tag 1 1 1 1 Security Camera 2 3 2 4 Smartgun 2 1 3 4
Examples of Standard nodes
Node Response Signal System Firewall Standard Home Telecom 3 3 3 3 Premium Telecom 4 3 4 4 Business/Retail Terminal 3 3 4 4 Public Terminal 2 1 2 2 Civic/MSP Wireless Access Point 3 6 3 5
FirewallWhile I understand the existence of security hardware, they are limited to crypto-processors (which access memory in strongly random method, and are protected against physical scan revealing the content of the registers). The actual firewall is a software package operating on given hardware.
Firewall is the device’s built-in security software. It protects against
unauthorized access and fends off hostile access attempts and exploits.
A firewall will, for instance, instantly block access to multiple icons
using the same access ID. Firewall is also used to defend against Matrix
attacks in cybercombat (p. 236).
My bad, I'm always getting the Firewall mixed up. It is software.QuoteFirewallWhile I understand the existence of security hardware, they are limited to crypto-processors (which access memory in strongly random method, and are protected against physical scan revealing the content of the registers). The actual firewall is a software package operating on given hardware.
Firewall is the device’s built-in security software. It protects against
unauthorized access and fends off hostile access attempts and exploits.
A firewall will, for instance, instantly block access to multiple icons
using the same access ID. Firewall is also used to defend against Matrix
attacks in cybercombat (p. 236).
Also, firewall is listen under matrix programs and programs rating are limited by system.
I have always considered that firewall, while being software is a matrix attribute and that therefore the program < system rule does not apply to it.I'd agree with this point of view.
I have always considered that firewall, while being software is a matrix attribute and that therefore the program < system rule does not apply to it.I'd agree with this point of view.
Matrix Attributes
Devices have Matrix attributes: Firewall, Response, Signal, and System.
Two of the Matrix attributes are based on the hardware in the device,
and the other two are software running on that hardware