Security Technology: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{ | {{Academy-Security}} | ||
__NOTOC__ | __NOTOC__ | ||
=== Communications === | === Communications === | ||
Line 17: | Line 17: | ||
* A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship | * A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship | ||
{{ | {{left|{{SecDutyPost}}}} | ||
=== Computer Systems === | === Computer Systems === | ||
* The center of nearly every security system in the 24th century is a computer. Control the computer, and you control the security system. The computer is the "brain" of a starship or installation, making it one of the parts most vulnerable to subversion and attack. Since the computer controls many functions automatically, completely outside the control of its crew, damage or sabotage of a ship's computer can sometimes leave it helpless. | * The center of nearly every security system in the 24th century is a computer. Control the computer, and you control the security system. The computer is the "brain" of a starship or installation, making it one of the parts most vulnerable to subversion and attack. Since the computer controls many functions automatically, completely outside the control of its crew, damage or sabotage of a ship's computer can sometimes leave it helpless. |
Latest revision as of 23:56, 7 February 2014
Academy Library |
---|
CommunicationsOne thing that can be difficult to secure is communications. A transmission can be overhead by anyone with a receiver tuned to the proper band, making communications vulnerable. A number of technological solutions have developed to keep communications private and prevent eavesdropping, but for every technique of covert communication, there is a way around it. Encryption
Piggybacking
Filtering Communications
Computer Systems
Transponder Signals and Prefix CodesStarfleet Security Codes & Data AccessLocks
Sensors
Visual Sensors
Motion Sensors
Infrared Sensors
Electromagnetic Sensors
Subspace Sensors
Starship Sensors
|