No edit summary |
|||
Line 21: | Line 21: | ||
{|class="wikitable" | {|class="wikitable" | ||
!Level | !Level | ||
!Granted To | |||
!Code Complexity | !Code Complexity | ||
!Authentication | !Authentication | ||
Line 27: | Line 27: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 0 | |style="white-space: nowrap;"|Level 0 | ||
|Civilian | |style="white-space: nowrap;"|Civilian | ||
|6 Token Code | |6 Token Code | ||
|Single Factor | |Single Factor | ||
Line 37: | Line 37: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 1 | |style="white-space: nowrap;"|Level 1 | ||
|Enlisted | |style="white-space: nowrap;"|Enlisted<br>NCO | ||
|8 Token Code | |8 Token Code | ||
|Single Factor | |Single Factor | ||
Line 48: | Line 48: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 2 | |style="white-space: nowrap;"|Level 2 | ||
|Commissioned Officers | |style="white-space: nowrap;"|Commissioned Officers | ||
|8 Token Code | |8 Token Code | ||
|Two Factor | |Two Factor | ||
Line 58: | Line 58: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 3 | |style="white-space: nowrap;"|Level 3 | ||
|Department Heads | |style="white-space: nowrap;"|Department Heads | ||
|8 Token Code | |8 Token Code | ||
|Two Factor | |Two Factor | ||
Line 69: | Line 69: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 4 | |style="white-space: nowrap;"|Level 4 | ||
|Executive Officer | |style="white-space: nowrap;"|Executive Officer | ||
|8 Token Code | |8 Token Code | ||
|Three Factor | |Three Factor | ||
Line 80: | Line 80: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 5 | |style="white-space: nowrap;"|Level 5 | ||
|Commanding Officer | |style="white-space: nowrap;"|Commanding Officer | ||
|8 Token Code | |8 Token Code | ||
|Three Factor | |Three Factor | ||
Line 92: | Line 92: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 6 | |style="white-space: nowrap;"|Level 6 | ||
|Temporal Operatives | |style="white-space: nowrap;"|Temporal Operatives<br>Animas Agents | ||
|10 Token Code | |10 Token Code | ||
|Three Factor | |Three Factor | ||
Line 103: | Line 103: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 7 | |style="white-space: nowrap;"|Level 7 | ||
|Flag Officers | |style="white-space: nowrap;"|Flag Officers | ||
|10 Token Code | |10 Token Code | ||
|Four Factor | |Four Factor | ||
Line 117: | Line 117: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 8 | |style="white-space: nowrap;"|Level 8 | ||
| | |style="white-space: nowrap;"|Division Head | ||
|10 Token Code | |10 Token Code | ||
|Four Factor | |Four Factor |
Revision as of 23:29, 21 December 2016
Command codes are specialized access codes used to access key command level functions. Such functions include most starship operations but more specifically allow personnel to access critical diagnostic, operational, and override functions of the main computer. All key functions are operated by command code.
Multifactor Authentication
Access to command functions is obtained through multifactor authentication schemes, these schemes utilize one or more of the following authentication parameters:
- Something You Know (i.e. access codes or username / password)
- Something You Have (i.e. physical access card or physical access key-fob)
- Something You Are (i.e. DNA, voice print, finger print, retinal scan, or other personally unique biometric data)
Access Cards / Fobs
In the case of a physical access card to key-fob, these require to be scanned by the computer or the short-lived alpha-numeric code for the device provided be input before access can be granted. When a key-fob produced a unique code, it lasts for 20 seconds, then it changed to a random or otherwise unpredictable code. Even if the proper access code or biometric data is given, if such a code or access is not available.
Combadge
A combadge provides multiple functions for the authentication process. For one, it can generate two forms of authentication. The device is equipped with a DNA scanner which, when attached close to the body (such as on clothes), is able to scan the wearers DNA and transmit verification data to the main computer. Secondly the device generates a 4096 bit authentication key every 20 seconds, this key is generated by the main computer as well. If the computers key and the combadge key both match, then this provides the same kind of authentication as key-fob.
Fourth Factor Authentication
Commands which require four factors of authentication require all three factors above and an additional biometric verification, usually voice print and DNA / retinal scan match before access is granted.
Command Levels
Command codes are given most often by rank, but specialized access may be given by someone of a given level, or above, overriding default access. Such instances are most often used with Non-Commissioned Officers who require specialized access but do not have specific rank. Usage of such access overrides is required to be audited but security personnel and reported on to the commanding officer or flag officer who originally granted the access. The table below indicates default access levels determined by rank.
Level | Granted To | Code Complexity | Authentication | Functions |
---|---|---|---|---|
Level 0 | Civilian | 6 Token Code | Single Factor |
|
Level 1 | Enlisted NCO |
8 Token Code | Single Factor |
|
Level 2 | Commissioned Officers | 8 Token Code | Two Factor |
|
Level 3 | Department Heads | 8 Token Code | Two Factor |
|
Level 4 | Executive Officer | 8 Token Code | Three Factor |
|
Level 5 | Commanding Officer | 8 Token Code | Three Factor |
|
Level 6 | Temporal Operatives Animas Agents |
10 Token Code | Three Factor |
|
Level 7 | Flag Officers | 10 Token Code | Four Factor |
|
Level 8 | Division Head | 10 Token Code | Four Factor |
|
In this case, a token is defined as a word from the Phonetic Alphabet table or a number.