fbpx
Wikipedia

Intrusion Countermeasures Electronics

Intrusion Countermeasures Electronics (ICE) is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers.

Origin of term

The term was popularized by William Gibson in his short story "Burning Chrome", which also introduced the term cyberspace, and in his subsequent novel Neuromancer.[1][2] According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox.[1]

Description of ICE

When viewed in a cyberspace virtual reality environment, these constructs are often represented by actual walls of ice, stone, or metal. Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be artificially intelligent.

Real-world usage

Though real-life firewalls, anti-virus software and similar programs fall under this classification, the term has little real world significance and remains primarily a science fiction concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a misnomer. On the other hand, there is a strong connection between real-world cybercrime and cyberpunk literature.[3] "The Gibsonian concept of cyberspace [...] fed back into both computer and information systems design and theory," wrote Roger Burrows.[4]

The term ICE has occasionally been used for real-world software:

  • BlackICE, an intrusion detection system built by a California company named Network ICE in 1999, acquired by IBM Internet Security Systems, then discontinued in 2007.[5][6]
  • The ICE cipher, an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine".[7]
  • The Java bytecode verifier in the Apache ByteCode Engineering Library (BCEL) is called JustIce (see the 'docs' folder for documentation).[8]

On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the United States Senate by Senator Tom Carper to make changes to the handling of information security by the federal government, including the establishment of the National Office for Cyberspace.[9][10]

Usage in fiction

The term ICE is widely used in cyberpunk fiction.

Anime

Cartoons

  • Phantom 2040, though in it "ICE" stands for "Integrated Cyber Environment", referring to cyberspace, rather than Intrusion Countermeasures Electronics[11]

Card games

  • Netrunner, where the corporate player uses ICE and the runner player uses icebreakers; while corps in Netrunner understand ICE to be an acronym for "Intrusion Countermeasures Electronics", the runner viewpoint is that the acronym should be for "Insidious Cortical Electrocution"
  • Android: Netrunner, an adaptation of the original Netrunner, formerly a Living Card Game.
  • Hacker and Hacker II - The Dark Side, where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE.

Literature

Roleplaying games

Movies

Television

Video games

  • Anarchy Online features an item called "Hacker ICE-Breaker Source", which can be further upgraded to "Intrusion Countermeasure Electronics Upgrade".
  • AI: The Somnium Files
  • Baldr Sky uses the term to describe the technology protecting the characters' "brain chips" and virtual structures.
  • BloodNet uses the term to describe the technology the player must overcome when hacking a computer system.
  • Cyberpunk 2077 uses the term to refer to defensive countermeasures that prevent netrunners and cyberware from hacking a target.
  • Deus Ex, where the player's hacking program is referred to as an "ICE Breaker"
  • Dystopia, wherein there are security programs called "ICE walls"
  • Mr. Robot, where "ICE" in its RPG part refers to shields or armor that can be attacked by various "ICE breaker"s
  • Midnight Protocol, where "ICE" is an umbrella term for security measures that shield nodes from being accessed
  • Neuromancer, where ICE, BlackICE, and ICE Breaking are highly featured.
  • Perfect Dark Zero, where players use ICE technology to bypass security.
  • Project Snowblind, features an ICE pick, to hack enemy cameras, turrets, and robots and use them against enemy forces.
  • Ripper has the player break into various cyberspace systems, which involves fighting the "ICE" security programs in the form of a rail shooter.
  • Star Wars: Knights of the Old Republic, an item called "ICE Breaker" can be obtained and used as a hacking tool during a sequence on the Leviathan, in which the player chooses one character to remain behind and attempt to rescue the other captured party members.
  • StarCrawlers features an ability called Black Ice, which the Hacker character may use.[12]
  • System Shock, where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations.
  • System Shock 2, where an item that auto-hacks electronics is known as an "ICE-Pick"
  • The Ascent, where items are protected by various levels of ICE that the player must overcome to access.
  • Invisible, Inc., wherein "ICE" is used intermittently with "firewalls" to reference mainframe defenses which the player-controlled AI program Incognita breaks through to take control of enemy electronics.

Web Comics

References

  1. ^ a b c . The Jargon File. 2003-10-27. Archived from the original on 2008-12-04. Retrieved 2008-11-21.
  2. ^ a b William Gibson (1984). Neuromancer. Ace Books. ISBN 0-441-56959-5.
  3. ^ Wall, D.S. (2012). "The Devil Drives a Lada: the social construction of hackers as cybercriminals". In Gregoriou, C. (ed.). The Construction of Crime. Palgrave Macmillan. pp. 4–18.
  4. ^ Burrows, Roger (1997). "Cyberpunk as Social Theory" (PDF). In Westwood, Sallie; Williams, John (eds.). Imagining Cities: Scripts, signs, memories. London: Routledge. pp. 235–48.
  5. ^ Edwards, M (8 December 1999). "BlackICE". ITPro Today. Retrieved 16 July 2020.
  6. ^ Naraine, Ryan. "IBM kills off BlackICE firewall". ZDNet. CBS Interactive. Retrieved 16 July 2020.
  7. ^ Kwan, Matthew (1997). "The Design of the ICE Encryption Algorithm" (PDF). Proceedings of Fast Software Encryption - Fourth International Workshop, Haifa, Israel. Lecture Notes in Computer Science. Springer-Verlag. 1267: 69–82. doi:10.1007/BFb0052335. ISBN 978-3-540-63247-4.
  8. ^ Haase, Enver. "JustIce". GitHub.
  9. ^ Howard, Alexander B. (2009-04-28). "ICE Act would restructure cybersecurity rule, create White House post". SearchCompliance. Retrieved 2010-05-07.
  10. ^ . OpenCongress. Archived from the original on 2010-08-31. Retrieved 2010-05-07.
  11. ^ "Fire and I.C.E.". Phantom 2040. Season 1. Episode 4.
  12. ^ "Hacker". StarCrawlers Wiki.

intrusion, countermeasures, electronics, black, redirects, here, other, uses, black, disambiguation, term, used, cyberpunk, literature, refer, security, programs, which, protect, computerized, data, from, being, accessed, hackers, contents, origin, term, descr. Black ICE redirects here For other uses see black ice disambiguation Intrusion Countermeasures Electronics ICE is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers Contents 1 Origin of term 2 Description of ICE 3 Real world usage 4 Usage in fiction 4 1 Anime 4 2 Cartoons 4 3 Card games 4 4 Literature 4 5 Roleplaying games 4 6 Movies 4 7 Television 4 8 Video games 4 9 Web Comics 5 ReferencesOrigin of term EditThe term was popularized by William Gibson in his short story Burning Chrome which also introduced the term cyberspace and in his subsequent novel Neuromancer 1 2 According to the Jargon File as well as Gibson s own acknowledgements the term ICE was originally coined by Tom Maddox 1 Description of ICE EditWhen viewed in a cyberspace virtual reality environment these constructs are often represented by actual walls of ice stone or metal Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate some forms of black ICE may be artificially intelligent Real world usage EditMain articles Computer security and Intrusion detection system Though real life firewalls anti virus software and similar programs fall under this classification the term has little real world significance and remains primarily a science fiction concept This can be attributed to the fact that using the term electronics to describe software products such as firewalls is something of a misnomer On the other hand there is a strong connection between real world cybercrime and cyberpunk literature 3 The Gibsonian concept of cyberspace fed back into both computer and information systems design and theory wrote Roger Burrows 4 The term ICE has occasionally been used for real world software BlackICE an intrusion detection system built by a California company named Network ICE in 1999 acquired by IBM Internet Security Systems then discontinued in 2007 5 6 The ICE cipher an encryption algorithm may be inspired by Gibson s ICE but it is explained as meaning Information Concealment Engine 7 The Java bytecode verifier in the Apache ByteCode Engineering Library BCEL is called JustIce see the docs folder for documentation 8 On April 28 2009 the Information and Communications Enhancement Act or ICE Act for short was introduced to the United States Senate by Senator Tom Carper to make changes to the handling of information security by the federal government including the establishment of the National Office for Cyberspace 9 10 Usage in fiction EditThe term ICE is widely used in cyberpunk fiction Anime Edit Cyberpunk Edgerunners Cyber City Oedo 808 Ghost in the Shell where ICE is referred to directly by name or else as an Attack Barrier Cartoons Edit Phantom 2040 though in it ICE stands for Integrated Cyber Environment referring to cyberspace rather than Intrusion Countermeasures Electronics 11 Card games Edit Netrunner where the corporate player uses ICE and the runner player uses icebreakers while corps in Netrunner understand ICE to be an acronym for Intrusion Countermeasures Electronics the runner viewpoint is that the acronym should be for Insidious Cortical Electrocution Android Netrunner an adaptation of the original Netrunner formerly a Living Card Game Hacker and Hacker II The Dark Side where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE Literature Edit Neuromancer original popularizer of the term 1 2 Count Zero the second novel of William Gibson s Sprawl trilogy Hyperion wherein black ICE is used to defend the TechnoCore Trouble and Her Friends by Melissa Scott wherein IC E refers to Intrusion Countermeasures Electronic solving the problem of implying that the measures are hardware basedRoleplaying games Edit Cyberpunk 2020 upon which the Netrunner card game is based GURPS Cyberpunk Shadowrun called IC The setting drops the electronics misnomer but is colloquially named Ice by hackers in the setting Movies Edit Johnny Mnemonic mentioned in the opening crawl Track Down wherein a friend of Kevin Mitnick says in a club that he is the hacker known as IceBreaker Television Edit Babylon 5 in the episode Born to the Purple Max Headroom in the episode Security Systems April 21 1987Video games Edit Anarchy Online features an item called Hacker ICE Breaker Source which can be further upgraded to Intrusion Countermeasure Electronics Upgrade AI The Somnium Files Baldr Sky uses the term to describe the technology protecting the characters brain chips and virtual structures BloodNet uses the term to describe the technology the player must overcome when hacking a computer system Cyberpunk 2077 uses the term to refer to defensive countermeasures that prevent netrunners and cyberware from hacking a target Deus Ex where the player s hacking program is referred to as an ICE Breaker Dystopia wherein there are security programs called ICE walls Mr Robot where ICE in its RPG part refers to shields or armor that can be attacked by various ICE breaker s Midnight Protocol where ICE is an umbrella term for security measures that shield nodes from being accessed Neuromancer where ICE BlackICE and ICE Breaking are highly featured Perfect Dark Zero where players use ICE technology to bypass security Project Snowblind features an ICE pick to hack enemy cameras turrets and robots and use them against enemy forces Ripper has the player break into various cyberspace systems which involves fighting the ICE security programs in the form of a rail shooter Star Wars Knights of the Old Republic an item called ICE Breaker can be obtained and used as a hacking tool during a sequence on the Leviathan in which the player chooses one character to remain behind and attempt to rescue the other captured party members StarCrawlers features an ability called Black Ice which the Hacker character may use 12 System Shock where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations System Shock 2 where an item that auto hacks electronics is known as an ICE Pick The Ascent where items are protected by various levels of ICE that the player must overcome to access Invisible Inc wherein ICE is used intermittently with firewalls to reference mainframe defenses which the player controlled AI program Incognita breaks through to take control of enemy electronics Web Comics Edit Schlock Mercenary icewalls are a standard security measure References Edit a b c Ice The Jargon File 2003 10 27 Archived from the original on 2008 12 04 Retrieved 2008 11 21 a b William Gibson 1984 Neuromancer Ace Books ISBN 0 441 56959 5 Wall D S 2012 The Devil Drives a Lada the social construction of hackers as cybercriminals In Gregoriou C ed The Construction of Crime Palgrave Macmillan pp 4 18 Burrows Roger 1997 Cyberpunk as Social Theory PDF In Westwood Sallie Williams John eds Imagining Cities Scripts signs memories London Routledge pp 235 48 Edwards M 8 December 1999 BlackICE ITPro Today Retrieved 16 July 2020 Naraine Ryan IBM kills off BlackICE firewall ZDNet CBS Interactive Retrieved 16 July 2020 Kwan Matthew 1997 The Design of the ICE Encryption Algorithm PDF Proceedings of Fast Software Encryption Fourth International Workshop Haifa Israel Lecture Notes in Computer Science Springer Verlag 1267 69 82 doi 10 1007 BFb0052335 ISBN 978 3 540 63247 4 Haase Enver JustIce GitHub Howard Alexander B 2009 04 28 ICE Act would restructure cybersecurity rule create White House post SearchCompliance Retrieved 2010 05 07 S 921 U S ICE Act of 2009 OpenCongress Archived from the original on 2010 08 31 Retrieved 2010 05 07 Fire and I C E Phantom 2040 Season 1 Episode 4 Hacker StarCrawlers Wiki Retrieved from https en wikipedia org w index php title Intrusion Countermeasures Electronics amp oldid 1131103747, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.