Home
Documents
Troubleshooting

SECTION 2 - SECURITY ERRORS

SECTION BRIEF - OSI is a high-security complex. Procedures have been implemented to prevent unauthorized entrance into the OSI Complex and unauthorized access to cybertank designs.

2.1 ID DISC PASSWORD SECURITY

In order to verify employment, you must enter the correct password for the Employee ID Disc being used. Failure to enter the correct password prompts a Security Breach alarm and informs the guards at the OSI Security Gate. This prevents the use of stolen ID discs to gain entrance to the OSI complex. If you forget your password when using your own ID Disc, you will be denied entrance into the OSI Complex. The Orientation Guide details password security.
Being denied access to the OSI Complex is an unfortunate circumstance, but it cannot be corrected unless you identify the correct password. Although the information on your ID Disc can be copied onto another using the Data Duplication Module (DDM), your clearance level is lost.

2.2 CYBERTANK DESIGN PASSWORD SECURITY

Cybertank design protection is a high priority at OSI. Security leaks must be avoided. When an employee creates a new cybertank design, the password used for the Employee ID Disc is incorporated into the cybertank design. Only employees with knowledge of the correct password can access that design.

NOTE: If an employee does not identify a password for the ID Disc, then designs created by that employee are not password protected. Those designs are accessible without a password.

In the Design Control Module (DCM), any cybertank design can be loaded from any disc. The design selected is inspected to ensure it has been properly authorized by OSI. If the passwords On the ID Disc and cybertank design do not match, the Security Breach alarm is then sounded.
Note that cybertanks created by other employees can also be used in simulations.
To obtain authorization when the passwords do not match, the designer can duplicate the design using the Data Duplication Module (DDM). The DDM removes the password from the cybertank design and it is now accessible by all employees. If an employee other than the designer trys to duplicate a protected design, the Security Breach alarm will sound. Only the designer can duplicate a protected cybertank design.

Toadstool's Home | Contact © 2003 Toadstool's Game Shrines. All Rights Reserved.