Intrusion Countermeasures Electronics (ICE) is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers.
The term was popularized by William Gibson in his short story "Burning Chrome", which also introduced the term cyberspace , and in his subsequent novel Neuromancer . [1] [2] According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox. [1]
When viewed in a cyberspace virtual reality environment, these constructs are often represented by actual walls of ice, stone, or metal. Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be artificially intelligent.
Though real-life firewalls, anti-virus software and similar programs fall under this classification, the term has little real world significance and remains primarily a science fiction concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a misnomer. On the other hand, there is a strong connection between real-world cybercrime and cyberpunk literature. [3] "The Gibsonian concept of cyberspace [...] fed back into both computer and information systems design and theory," wrote Roger Burrows. [4]
The term ICE has occasionally been used for real-world software:
On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the United States Senate by Senator Tom Carper to make changes to the handling of information security by the federal government, including the establishment of the National Office for Cyberspace. [9] [10]
The term ICE is widely used in cyberpunk fiction.
Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting said to focus on a combination of "low-life and high tech". It features futuristic technological and scientific achievements, such as artificial intelligence and cyberware, juxtaposed with societal collapse, dystopia or decay. Much of cyberpunk is rooted in the New Wave science fiction movement of the 1960s and 1970s, when writers like Philip K. Dick, Michael Moorcock, Roger Zelazny, John Brunner, J. G. Ballard, Philip José Farmer and Harlan Ellison examined the impact of technology, drug culture, and the sexual revolution while avoiding the utopian tendencies of earlier science fiction.
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security professionals, governments, military and industry leaders and entrepreneurs to describe the domain of the global technology environment, commonly defined as standing for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the use of the Internet, networking, and digital communication were all growing dramatically; the term cyberspace was able to represent the many new ideas and phenomena that were emerging. As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network. Cyberspace users are sometimes referred to as cybernauts.
Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals.
Neuromancer is a 1984 science fiction novel by American-Canadian writer William Gibson. Considered one of the earliest and best-known works in the cyberpunk genre, it is the only novel to win the Nebula Award, the Philip K. Dick Award, and the Hugo Award. It was Gibson's debut novel and the beginning of the Sprawl trilogy. Set in the future, the novel follows Henry Case, a washed-up hacker hired for one last job, which brings him in contact with a powerful artificial intelligence.
William Ford Gibson is an American-Canadian speculative fiction writer and essayist widely credited with pioneering the science fiction subgenre known as cyberpunk. Beginning his writing career in the late 1970s, his early works were noir, near-future stories that explored the effects of technology, cybernetics, and computer networks on humans, a "combination of lowlife and high tech"—and helped to create an iconography for the Information Age before the ubiquity of the Internet in the 1990s. Gibson coined the term "cyberspace" for "widespread, interconnected digital technology" in his short story "Burning Chrome" (1982), and later popularized the concept in his acclaimed debut novel Neuromancer (1984). These early works of Gibson's have been credited with "renovating" science fiction literature in the 1980s.
Netrunner is an out-of-print collectible card game (CCG) designed by Richard Garfield, the creator of Magic: The Gathering. It was published by Wizards of the Coast and introduced in April 1996. It was produced until 1999. The game took place in the setting for the Cyberpunk 2020 role-playing game (RPG), but it also drew from the broader cyberpunk genre.
Count Zero is a science fiction novel by American-Canadian writer William Gibson, originally published in 1986. It presents a near future whose technologies include a network of supercomputers that created a "matrix" in "cyberspace", an accessible, virtual, three-dimensionally active "inner space", which, for Gibson—writing these decades earlier—was seen as being dominated by violent competition between small numbers of very rich individuals and multinational corporations. The novel is composed of a trio of plot lines that ultimately converge.
A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.
GURPS Cyberpunk is a genre toolkit for cyberpunk-themed role-playing games set in a near-future dystopia, such as that envisioned by William Gibson in his influential novel Neuromancer. It was published in 1990 after a significant delay caused by the original draft being a primary piece of evidence in Steve Jackson Games, Inc. v. United States Secret Service.
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.
Tom Maddox was an American science fiction writer, known for his part in the early cyberpunk movement.
A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.
Neuromancer is an adventure video game developed by Interplay Productions and published by Mediagenic. It was released in 1988 for the Amiga, Apple II, Apple IIGS, Commodore 64, and MS-DOS. It was loosely based on William Gibson's 1984 novel of the same name and set within both the fictional "real world" and the extensively realized and detailed world of cyberspace. It has a soundtrack based on the Devo song "Some Things Never Change" from their album Total Devo. Writer Timothy Leary had sub-contracted the rights to a video game adaptation of the novel, and eventually brought the project to Interplay to develop.
Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.
The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.
Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.
The following outline is provided as an overview of and topical guide to computer security:
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.
{{cite book}}
: |journal=
ignored (help)