A security sheaf describes the security measures in place on a host or
grid as well as how the host/grid reacts to intruders. Quite simply, a
sheaf consists of a list of trigger steps.
These steps represent security tally thresholds. As a decker’s security
tally reaches each trigger step, the system activates one or more IC
programs. Trigger steps also activate the various alert levels in a
system. The alert status of the system, in turn, affects the types of IC
programs the system activates.
The security code of the host/grid determines the frequency of trigger
steps in a system, and the game-master determines the events activated by
each trigger step.
Game-masters may use their own discretion or random generation to
determine these events.