|
Post by Lieutenant Xemion Xethrill on Sept 24, 2013 12:01:13 GMT -5
Mhm, I will have to agree with you on this one. But in an OOC view, I feel like the show really just made it up as they went along. XD
|
|
|
Post by Captain T'Pang on Sept 24, 2013 12:02:16 GMT -5
Basically the way I think it works is a person is given just enough of a clearance to do their job and nothing more. Example Bashir makes quite a bit of sense given his job on a space station. While I don't know that we need to apply to much effort into formalizing any security clearance system, but from and RP stand point such things are interesting to chat about. As far as Doctor Spencer I would assume her SC would be level four, and really only that high due to her being a department head. Arin Soran would probably be level three, as her job would not need anything higher. Commander T'Pang probably level nine with some need to know knowledge of some stuff that would be level ten.
|
|
|
Post by Lieutenant Xemion Xethrill on Sept 24, 2013 12:10:34 GMT -5
Then Xem would have level 4! Now to go come up with a cool sounding access code...
|
|
|
Post by DGM Soft Kitty on Sept 24, 2013 12:14:03 GMT -5
|
|
|
Post by Lieutenant Xemion Xethrill on Sept 24, 2013 12:29:26 GMT -5
Yes. XD
|
|
|
Post by Captain Anja Malitzka on Sept 24, 2013 15:24:55 GMT -5
I think this is a better code.
|
|
|
Post by Lt Cmdr Billie Jo Spencer MD on Sept 24, 2013 16:43:27 GMT -5
I think this is a better code. Yeah that is Spencer's password. Good to know all your sensitive medical information is so well protected.
|
|
|
Post by Lieutenant Xemion Xethrill on Sept 24, 2013 20:13:35 GMT -5
Using this fun tool: howsecureismypassword.net/It would take Data(calculation speed of 60 trillion calculations per second) 6 quadrillion quadragintillion years to crack the access code from hell, and it would take the main computer core of Voyager(calculation speed of 575 trillion calculations per nanosecond) 690 trillion quadragintillion years to forcibly crack it. Access Code from hell: Length: 73 characters Character Combinations: 156 Possible Combinations: 12 million quinquavigintillion That is one strong password...
|
|
VADM Meranda Kalavek (Ret.)
Unassigned Officers
Fleet C.O. of the 22nd Mobile Fleet (Ret.)
Attaching her signature stamp to Shed's paws and letting him play amongst her paperwork...
Posts: 602
|
Post by VADM Meranda Kalavek (Ret.) on Oct 8, 2013 7:03:04 GMT -5
I would imagine knowing some ones code would only be one part of the puzzle. In a tech based world like Star Trek I would think that not only is the voice verified but a scan of the person entering the code is made as well. With Changlings, androids, AIs and Tripods running around assuming identities I would think it takes more then a password in the right voice. As an Engineering Admiral I'd welcome suggestions for what should be going on in the background when some one enters their codes.
For instance Kitty knows there is one function M uses that not only requires her code but won't work without a specific console that's part of the "key".
|
|
|
Post by Lieutenant Xemion Xethrill on Oct 8, 2013 9:37:48 GMT -5
I guess for Xem it would be code, voice, retina scan, and I wonder if the computer could detect my electromagnetic field... Then my code couldn't be broken! M, there is an idea! Scanning someones electromagnetic field as they are all unique!
|
|
|
Post by Captain Erys Murai on Oct 8, 2013 10:07:49 GMT -5
Hasn't been a code invented yet that can't be broken with the right tools. Given enough time and resources, someone would find a way to breach security no matter how secure you make it. For every "trick" you come up with, someone will counter it.
Password: I just have to wait for you to say it, or listen to logs of normal ship operations. Voice: Easy... your voice pattern is on record, and I can duplicate that with a simple voice modulator (modify my combadge, tricorder, etc if necessary) Retina Scan: Hologram. Electromatic Field: Modify the tricorder to match your biosigns. Console Required: Simple... use the right console, or trick the system into thinking it's the "correct" console.
Now, obviously most of those will require some level of skill to accomplish those, but pretty much all of them have already been done in canon at one point or another. The doctor managed to copy various members of the crew without much trouble (starting with Janeway, which basically gave him full control of the ship).
Hell, even the Sentinel isn't invulnerable to security breaches, no matter how much I like to pretend she is.
|
|
VADM Meranda Kalavek (Ret.)
Unassigned Officers
Fleet C.O. of the 22nd Mobile Fleet (Ret.)
Attaching her signature stamp to Shed's paws and letting him play amongst her paperwork...
Posts: 602
|
Post by VADM Meranda Kalavek (Ret.) on Oct 8, 2013 10:44:24 GMT -5
Guess code, voice and scan of the operator is neerly as good as we'll get. The interface (consol) could be coppied but you'd probably need the interface to copy it.
|
|
|
Post by Captain T'Pang on Oct 8, 2013 12:31:45 GMT -5
Modern codes are designed so that the numbers are so large that it would take more computing power than there is in the world. So that if you run them for the life time of the universe, it would not be enough. So yeah if you had unlimited computer power and unlimited time no code would be safe. Of course that is top of the line crypto, not the sort of thing you might see on your typical wireless router.
Facts are that almost all breaks of cipher systems are due to implementation errors, operational failures, burglary, blackmail and bribery.
|
|
|
Post by Lieutenant Xemion Xethrill on Oct 8, 2013 13:30:08 GMT -5
Well, what if I never say my password out loud or have it stated on a log?
And really, passwords just make it slightly harder with the tech of Star trek, they become more of an inconvenience rather than a road block to a hacker.
|
|
|
Post by Captain Erys Murai on Oct 8, 2013 15:13:58 GMT -5
pretty much, yes.
If it's on a federation network, there's backdoor access to it, unless you've written your OS completely from scratch (which would mean you're no longer using a Starfleet-approved system). Custom-built means it's a security risk and an unknown factor, so most custom-built systems, devices, etc. aren't going to be allowed in use aboard a starship without direct approval from the chief engineer, chief of security, executive officer, and/or the captain.
In other words, unless you're violating a few regulations, or have your network isolated, any section 31 agent or high-clearance officer will be able to access your system one way or another.
|
|