Files are found in Data nodes of a system, and are usually guarded as they represent most common target for deckers.
Each file is of one of following types:
All files are unknown first and must be scanned to determine exact file type. During scan the decker has to remain in the node or scan is aborted.
Scanner found no value for decker in these files.
Valuable file has potential market value. Usually it contains accounting data, classified project data or other corporate information. Can be evaluated by Evaluate software to try determine exact market value.
If contract specifies file operation ( download/edit/delete ), the specified files are marked as mission by scanner program. Decker has to perform the requested action on them to fulfill mission goal. Deleting mission file may fail the mission if deletion was not requested by client.
Passcode file contains valid password credentials for the system. When downloaded, decker can bypass Scanner ICE.
Clue file contains valuable information about mission target. Downloading the clue file will reveal node of mission target.
Source file contains source code for software or design specification of hardware. Both can be used by decker between missions to compile a software or construct the HW part. Decker still needs to have appropriate skill to use the source.
Any file can be protected by Worm ICE. Worm ICE will raise alarm when attacked by normal attack programs and will delete the file it is protecting. Decrypt software is needed to remove this ICE from file before it can be scanned or accessed by decker.Tweet