For an attack to take place, the enemy's Computer must have an open and unrestricted communications channel to the defended Computer. The simplest security method is to ensure that this is not the case. Once that connection is made, however, it is then the Security Program that prevents access to the data and functions held therein.
Every Computer is delivered with a basic level of security. This security is, however, not infallible and more effective security software is generally installed if possible - although the hardware needed to run that improved software can, of itself, become an extensive requirement with its own associated costs.
Selected Computer Programs
- Anti-Missile Program 
- Auto/Evade Program 
- ECM Program 
- Maneuver/Evade Program 
- Return Fire Program 
- Point Defence Program 
- Screen Optimiser Program 
The Software List: The computer software list, available at nearly any software vendor or port, indicates the various programs that are available. It shows space required by a specific program in CPU or storage, its price in MCr, and its title. Also shown is a brief overview of its effects. 
Software Authorship: Various requirements exist for individual characters producing existing or new programs. Such a course can save money, but may have some pitfalls. Program generation is explained elsewhere.