Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Intrusion Countermeasures Electronics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Real-world usage== {{main|Computer security|Intrusion detection system}} Though real-life [[firewall (networking)|firewalls]], [[anti-virus software]] and similar programs fall under this classification, the term has little real world significance and remains primarily a [[science fiction]] concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a [[misnomer]]. On the other hand, there is a strong connection between real-world [[cybercrime]] and cyberpunk literature.<ref>{{cite book |last1=Wall |first1=D.S. |title=The Construction of Crime |date=2012 |publisher=Palgrave Macmillan |editor1-last=Gregoriou |editor1-first=C. |pages=4β18 |chapter=The Devil Drives a Lada: the social construction of hackers as cybercriminals |chapter-url=}}</ref> "The Gibsonian concept of cyberspace [...] fed back into both computer and information systems design and theory," wrote Roger Burrows.<ref>{{cite book |last1=Burrows |first1=Roger |editor1-last=Westwood |editor1-first=Sallie |editor2-last=Williams |editor2-first=John |title=Imagining Cities: Scripts, signs, memories |date=1997 |publisher=Routledge |location=London |pages=235β48 |chapter-url=https://d1wqtxts1xzle7.cloudfront.net/8232287/imagining.cities.scripts.signs.memories.dec.1996_jlu.pdf?1328221797=&response-content-disposition=inline%3B+filename%3DTHIS_HERE_NOW.pdf&Expires=1594913570&Signature=dNEEVxmg2atTvH-BuY5jZJK~ow8ofzjOJFUJi1~MXPn9lyuex7i5hbVU4cXT02kweU7CxA5p8fDta~R3slaqLNGKrIjbqWVI0tcKflb4TcjADqa399Ueo9oAOIFW8zDrf2Pkxbsh3xshiUWFVWRtKkYTTErNeG33jNSm0oYcWPh9MsT2mNcuC5nCpysqVmxyz4HfZEjpB28QK79IbITs~iRStXFrDP9mzgPa6oGWIqjNoWE0pK-qKTcCu6mZN1brM-LM-4nG6VSUEPvbc0tbKYMbGJ~dtUAj5Czg3kwOzXtaDFagtGUROlh-AziCyJ-HBmQIUMgZcKXDwbVq8NtTjg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=244 |chapter=Cyberpunk as Social Theory}}</ref> The term ICE has occasionally been used for real-world software: * ''BlackICE'', an [[intrusion detection system]] built by a California company named Network ICE in 1999, acquired by [[IBM Internet Security Systems]], then discontinued in 2007.<ref>{{cite web |last1=Edwards |first1=M |title=BlackICE |url=https://www.itprotoday.com/compute-engines/blackice |website=ITPro Today |access-date=16 July 2020 |date=8 December 1999}}</ref><ref>{{cite web |last1=Naraine |first1=Ryan |title=IBM kills off BlackICE firewall |url=https://www.zdnet.com/article/ibm-kills-off-blackice-firewall/ |website=ZDNet |publisher=CBS Interactive |access-date=16 July 2020}}</ref> * The [[ICE (cipher)|ICE cipher]], an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine".<ref>{{cite book |last1=Kwan |first1=Matthew |title=Fast Software Encryption |chapter=The design of the ICE encryption algorithm |journal=Proceedings of Fast Software Encryption - Fourth International Workshop, Haifa, Israel |series=Lecture Notes in Computer Science |date=1997 |volume=1267 |pages=69β82 |chapter-url=https://link.springer.com/content/pdf/10.1007%2FBFb0052335.pdf |publisher=Springer-Verlag|doi=10.1007/BFb0052335 |isbn=978-3-540-63247-4 }}</ref> * The Java bytecode verifier in the Apache ByteCode Engineering Library (BCEL) is called JustIce (see the 'docs' folder for documentation).<ref>{{cite web|url=https://github.com/apache/commons-bcel/blob/master/docs/verifier/JustIce.lyx|title=JustIce|last=Haase|first=Enver|website=[[GitHub]] }}</ref> On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the [[United States Senate]] by Senator [[Tom Carper]] to make changes to the handling of [[information security]] by the federal government, including the establishment of the National Office for Cyberspace.<ref name="ICEAct">{{cite web|url=http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1354854,00.html|title=ICE Act would restructure cybersecurity rule, create White House post|last=Howard|first=Alexander B.|publisher=SearchCompliance|date=2009-04-28|access-date=2010-05-07|archive-date=2009-11-08|archive-url=https://web.archive.org/web/20091108184204/http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1354854,00.html|url-status=dead}}</ref><ref name="ICEAct-OpenCongress">{{cite web|url=http://www.opencongress.org/bill/111-s921/show|title=S.921 - U.S. ICE Act of 2009|publisher=OpenCongress|access-date=2010-05-07|url-status=dead|archive-url=https://web.archive.org/web/20100831005015/http://www.opencongress.org/bill/111-s921/show|archive-date=2010-08-31}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)