John Locke
V U L K A N
OUT OF CHARACTER INFORMATION
[SIZE=11pt]Intent: To submit a cybersecurity package[/SIZE]
[SIZE=11pt]Image Source: [/SIZE][SIZE=11pt]monkfox[/SIZE]
[SIZE=11pt]Canon Link: N/a[/SIZE]
[SIZE=11pt]Primary Source: N/a[/SIZE]
PRODUCTION INFORMATION
Manufacturer: Locke and Key Mechanics
Affiliation: Closed-Market (Any character can use this if they have explicit permission through, for example, a marketplace purchase)
Model: [SIZE=11pt]Padlocke[/SIZE]
Modularity: Yes; can be updated with new information on virus and anti-intrusion
Production: Mass-Produced. (Anyone.) Characters refer to NPCs & PCs.
Material: Programming
SPECIAL FEATURES
- Firewall
- System Scan
- Wireless Protection
- Cloudbased Neural Network Model capable of utilising heuristic algorithms
- Malware Scan
- Intrusion Detection System/Intrusion Prevention System
- Data Encryption/Decryption
- File Shredding
- Communication filtering and scanning
- Holonet protection
- AntiSpam
- Padlocke can learn in real-time, adjusting its tactics and techniques to counter those being used against it.
- When connected to the cloud it can utilise the processing power of the dedicated farms to support the system that has come under attack.
- [SIZE=11pt]A skilled slicer can throw increasingly innovative techniques at the system keeping it on the backfoot.[/SIZE]
- [SIZE=11pt]When taken offline from the cloud systems Padlocke is forced to rely on the resources of the system it has been loaded into, which can slow down and degrade other systems.[/SIZE]
[SIZE=11pt]Padlocke is Locke and Key Mechanic’s first foray into cybersecurity and digital protection, designed to be a suite that could protect their products from both malware and hostile intrusion by slicers. [/SIZE]
[SIZE=11pt]The software is designed with two focuses, firstly the identify and prevent hostile intrusion, and secondly to prevent malicious software from affecting the hardware it is installed into. [/SIZE]
[SIZE=11pt]Anti-Hacking[/SIZE]
[SIZE=11pt]Locke and Key has always tried to provide the most cutting-edge technology to their customers, but they soon started to realise, that very technology which they were so proud of could easily be subverted and used against their owners. This was a suboptimal outcome, and so they decided to do something about it. [/SIZE]
[SIZE=11pt]The software provides a powerful firewall capable of defeating most cursory attacks or scaring away most low-level slicers. It is what lies behind the firewall that is truly impressive. Using an artificial neural network Padlocke is capable of learning and adjusting, not the true sentience of an Artificial Intelligence, but a machine capable of adjusting and adapting to changing circumstances. After each new attack, the software is capable of adjusting making it more difficult for the same attack to be as effective another time. This data is shared with the central servers and then propagated out to other instances of the program, what one version of the program experiences can be shared across the board. It is this Artificial Neural Network that acts as a Host Based Intrusion Prevention System, capable of combating the intrusion, sealing of entry points and countering the efforts of a slicer. [/SIZE]
[SIZE=11pt]Due to its nature, Padlocke is able to learn the idiosyncrasies of any system it’s loaded into, which aids it in spotting any irregularities in the system. It is therefore also able to learn about the various authorised system users, building up a profile on each of them that can be shared across the network, this too allows the system to identify any discrepancies which could mean an intrusion was occurring so the system could counter the attack.[/SIZE]
[SIZE=11pt]Not every system has the resources to manage this completely by themselves, to do so would eat up too many of the system's resources. To counter this Locke and Key turned to the tried and tested Quantum Key Encryption, using a link to a powerful cloud computing network that can provide the extra processing power needed to run PadLocke at it’s fullest capability. Not every system is capable of running Padloke at it’s fullest internally, nor of accessing the Holonet or the cloud-based system. For those times the software can run in a lesser mode, only using the necessary resources. When the system comes under attack, however, this can start to eat up more and more of the finite resources available. [/SIZE]
[SIZE=11pt]Anti-Virus[/SIZE]
[SIZE=11pt]In addition to anti-intrusion, Padlocke is capable of standard Malware protection, scanning and blocking viruses and other forms of malware. As with the intrusion methods the virus’ the system comes up against are shared with the network so that similar viruses will have a harder time and can be more effectively countered. [/SIZE]