Intrusion Countermeasures Electronics: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎Real-world usage: add BlackICE note about discontinuation, cite
→‎Real-world usage: Explanation of usage, influence of cyberpunk, citations
Line 10: Line 10:
==Real-world usage==
==Real-world usage==
{{main|Computer security|Intrusion detection system}}
{{main|Computer security|Intrusion detection system}}
Though real-life [[firewall (networking)|firewalls]], [[anti-virus software]] and similar programs fall under this classification, the term has little real world significance and remains primarily a [[science fiction]] concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a [[misnomer]]. On the other hand, there is a strong connection between real-world [[cybercrime]] and cyberpunk literature.<ref>{{cite book |last1=Wall |first1=D.S. |editor1-last=Gregoriou |editor1-first=C. |title=The Construction of Crime |date=2012 |publisher=Palgrave Macmillan |pages=4-18 |chapter=The Devil Drives a Lada: the social construction of hackers as cybercriminals |url=url=https://poseidon01.ssrn.com/delivery.php?ID=165004066095104069081103118000011105123084002028060035065096023069124067109105006118025018021022008009118083125092113011069127108054086029012103030108031115090074050005073098117097108112004021087012111100065123077118111096110066116088103088119116081&EXT=pdf}}</ref> "The Gibsonian concept of cyberspace [...] fed back into both computer and information systems design and theory," wrote Roger Burrows.<ref>{{cite book |last1=Burrows |first1=Roger |editor1-last=Westwood |editor1-first=Sallie |editor2-last=Williams |editor2-first=John |title=Imagining Cities: Scripts, signs, memories |date=1997 |publisher=Routledge |location=London |pages=235-48 |url=https://d1wqtxts1xzle7.cloudfront.net/8232287/imagining.cities.scripts.signs.memories.dec.1996_jlu.pdf?1328221797=&response-content-disposition=inline%3B+filename%3DTHIS_HERE_NOW.pdf&Expires=1594913570&Signature=dNEEVxmg2atTvH-BuY5jZJK~ow8ofzjOJFUJi1~MXPn9lyuex7i5hbVU4cXT02kweU7CxA5p8fDta~R3slaqLNGKrIjbqWVI0tcKflb4TcjADqa399Ueo9oAOIFW8zDrf2Pkxbsh3xshiUWFVWRtKkYTTErNeG33jNSm0oYcWPh9MsT2mNcuC5nCpysqVmxyz4HfZEjpB28QK79IbITs~iRStXFrDP9mzgPa6oGWIqjNoWE0pK-qKTcCu6mZN1brM-LM-4nG6VSUEPvbc0tbKYMbGJ~dtUAj5Czg3kwOzXtaDFagtGUROlh-AziCyJ-HBmQIUMgZcKXDwbVq8NtTjg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=244 |chapter=Cyberpunk as Social Theory}}</ref>
Though real-life [[firewall (networking)|firewalls]], [[anti-virus software]] and similar programs fall under this classification, the term has little real world significance and remains primarily a [[science fiction]] concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a [[misnomer]].


Nevertheless, the term ICE has recently been adopted by real-world software manufacturers:
The term ICE has occasionally been used for real-world software:
* ''BlackICE'', security software once made by [[IBM Internet Security Systems]], discontinued 2007<ref>{{cite web |last1=Naraine |first1=Ryan |title=IBM kills off BlackICE firewall |url=https://www.zdnet.com/article/ibm-kills-off-blackice-firewall/ |website=ZDNet |publisher=CBS Interactive |accessdate=16 July 2020}}</ref>
* ''BlackICE'', an [[intrusion detection system]] built by a California company named Network ICE in 1999, acquired by [[IBM Internet Security Systems]], then discontinued in 2007.<ref>{{cite web |last1=Edwards |first1=M |title=BlackICE |url=https://www.itprotoday.com/compute-engines/blackice |website=ITPro Today |accessdate=16 July 2020 |date=08 December 1999}}</ref><ref>{{cite web |last1=Naraine |first1=Ryan |title=IBM kills off BlackICE firewall |url=https://www.zdnet.com/article/ibm-kills-off-blackice-firewall/ |website=ZDNet |publisher=CBS Interactive |accessdate=16 July 2020}}</ref>
* The [[ICE (cipher)|ICE cipher]], an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine".<ref>{{cite journal |last1=Kwan |first1=Matthew |title=The Design of the ICE Encryption Algorithm |journal=proceedings of Fast Software Encryption - Fourth International Workshop, Haifa, Israel |date=1997 |pages=69-82 |url=https://link.springer.com/content/pdf/10.1007%2FBFb0052335.pdf |publisher=Springer-Verlag}}</ref>
* The [[ICE (cipher)|ICE cipher]]


On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the [[United States Senate]] by Senator [[Tom Carper]] to make changes to the handling of [[information security]] by the federal government, including the establishment of the National Office for Cyberspace.<ref name="ICEAct">{{cite web|url=http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1354854,00.html|title= ICE Act would restructure cybersecurity rule, create White House post|last=Howard|first=Alexander B.|publisher=SearchCompliance|date=2009-04-28|accessdate=2010-05-07}}</ref><ref name="ICEAct-OpenCongress">{{cite web|url=http://www.opencongress.org/bill/111-s921/show|title=S.921 - U.S. ICE Act of 2009|publisher=OpenCongress|accessdate=2010-05-07|url-status=dead|archiveurl=https://web.archive.org/web/20100831005015/http://www.opencongress.org/bill/111-s921/show|archivedate=2010-08-31}}</ref>
On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the [[United States Senate]] by Senator [[Tom Carper]] to make changes to the handling of [[information security]] by the federal government, including the establishment of the National Office for Cyberspace.<ref name="ICEAct">{{cite web|url=http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1354854,00.html|title= ICE Act would restructure cybersecurity rule, create White House post|last=Howard|first=Alexander B.|publisher=SearchCompliance|date=2009-04-28|accessdate=2010-05-07}}</ref><ref name="ICEAct-OpenCongress">{{cite web|url=http://www.opencongress.org/bill/111-s921/show|title=S.921 - U.S. ICE Act of 2009|publisher=OpenCongress|accessdate=2010-05-07|url-status=dead|archiveurl=https://web.archive.org/web/20100831005015/http://www.opencongress.org/bill/111-s921/show|archivedate=2010-08-31}}</ref>

Revision as of 14:52, 16 July 2020

Intrusion Countermeasures Electronics (ICE) is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers.

Origin of term

The term was popularized by William Gibson in his short story "Burning Chrome", which also introduced the term cyberspace, and his subsequent novel Neuromancer.[1][2] According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox.[1]

Description of ICE

When viewed in a cyberspace virtual reality environment, these constructs are often represented by actual walls of ice, stone, or metal. Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be artificially intelligent.

Real-world usage

Though real-life firewalls, anti-virus software and similar programs fall under this classification, the term has little real world significance and remains primarily a science fiction concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a misnomer. On the other hand, there is a strong connection between real-world cybercrime and cyberpunk literature.[3] "The Gibsonian concept of cyberspace [...] fed back into both computer and information systems design and theory," wrote Roger Burrows.[4]

The term ICE has occasionally been used for real-world software:

On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the United States Senate by Senator Tom Carper to make changes to the handling of information security by the federal government, including the establishment of the National Office for Cyberspace.[8][9]

Usage in fiction

The term ICE is widely used in cyberpunk fiction.

Anime

Cartoons

  • Phantom 2040, though in it "ICE" stands for "Integrated Cyber Environment", referring to cyberspace, rather than Intrusion Countermeasures Electronics[10]

Card games

  • Netrunner, where the corporate player uses ICE and the runner player uses icebreakers; while corps in Netrunner understand ICE to be an acronym for "Intrusion Countermeasures Electronics", the runner viewpoint is that the acronym should be for "Insidious Cortical Electrocution"
  • Android: Netrunner, an adaptation of the original Netrunner, formerly a Living Card Game.
  • Hacker and Hacker II - The Dark Side, where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE.

Literature

Roleplaying games

Movies

Television

Video games

  • Anarchy Online features an item called "Hacker ICE-Breaker Source", which can be further upgraded to "Intrusion Countermeasure Electronics Upgrade".
  • BloodNet uses the term to describe the technology the player must overcome when hacking a computer system.
  • Deus Ex, where the player's hacking program is referred to as an "ICE Breaker"
  • Dystopia, wherein there are security programs called "ICE walls"
  • Mr. Robot, where "ICE" in its RPG part refers to shields or armor that can be attacked by various "ICE breaker"s
  • Neuromancer, where ICE, BlackICE, and ICE Breaking are highly featured.
  • Perfect Dark Zero, where players use ICE technology to bypass security.
  • Project Snowblind, features an ICE pick, to hack enemy cameras, turrets, and robots and use them against enemy forces.
  • Ripper has the player break into various cyberspace systems, which involves fighting the "ICE" security programs in the form of a rail shooter.
  • Star Wars: Knights of the Old Republic, an item called "ICE Breaker" can be obtained and used as a hacking tool during a sequence on the Leviathan, in which the player chooses one character to remain behind and attempt to rescue the other captured party members.
  • StarCrawlers features an ability called Black Ice, which the Hacker character may use. [11]
  • System Shock, where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations.
  • System Shock 2, where an item that auto-hacks electronics is known as an "ICE-Pick"

Web Comics

References

  1. ^ a b c "Ice". The Jargon File. 2003-10-27. Archived from the original on 2008-12-04. Retrieved 2008-11-21.
  2. ^ a b William Gibson (1984). Neuromancer. Ace Books. ISBN 0-441-56959-5.
  3. ^ Wall, D.S. (2012). "The Devil Drives a Lada: the social construction of hackers as cybercriminals". In Gregoriou, C. (ed.). [url=https://poseidon01.ssrn.com/delivery.php?ID=165004066095104069081103118000011105123084002028060035065096023069124067109105006118025018021022008009118083125092113011069127108054086029012103030108031115090074050005073098117097108112004021087012111100065123077118111096110066116088103088119116081&EXT=pdf The Construction of Crime]. Palgrave Macmillan. pp. 4–18. {{cite book}}: Check |url= value (help); Missing pipe in: |url= (help)
  4. ^ Burrows, Roger (1997). "Cyberpunk as Social Theory". In Westwood, Sallie; Williams, John (eds.). Imagining Cities: Scripts, signs, memories (PDF). London: Routledge. pp. 235–48.
  5. ^ Edwards, M (08 December 1999). "BlackICE". ITPro Today. Retrieved 16 July 2020. {{cite web}}: Check date values in: |date= (help)
  6. ^ Naraine, Ryan. "IBM kills off BlackICE firewall". ZDNet. CBS Interactive. Retrieved 16 July 2020.
  7. ^ Kwan, Matthew (1997). "The Design of the ICE Encryption Algorithm" (PDF). proceedings of Fast Software Encryption - Fourth International Workshop, Haifa, Israel. Springer-Verlag: 69–82.
  8. ^ Howard, Alexander B. (2009-04-28). "ICE Act would restructure cybersecurity rule, create White House post". SearchCompliance. Retrieved 2010-05-07.
  9. ^ "S.921 - U.S. ICE Act of 2009". OpenCongress. Archived from the original on 2010-08-31. Retrieved 2010-05-07.
  10. ^ "Fire and I.C.E.". Phantom 2040. Season 1. Episode 4. {{cite episode}}: Unknown parameter |serieslink= ignored (|series-link= suggested) (help)
  11. ^ "Hacker". StarCrawlers Wiki.