home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!olivea!pagesat!netsys!agate!ames!sun-barr!cs.utexas.edu!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!newsaintmail
- From: HURH@FNAL.FNAL.GOV (Patrick Hurh)
- Newsgroups: alt.cyberspace
- Subject: Re: representing Ice?
- Message-ID: <HURH-260193231542@131.225.123.13>
- Date: 27 Jan 93 05:25:51 GMT
- References: <1993Jan26.211402.1@rulfsw.leidenuniv.nl>
- Sender: daemon@linac.fnal.gov (The Background Man)
- Followup-To: alt.cyberspace
- Organization: Fermi Lab
- Lines: 46
- Nntp-Posting-Host: 131.225.123.13
-
- In article <1993Jan26.211402.1@rulfsw.leidenuniv.nl>,
- ruiter@rulfsw.leidenuniv.nl wrote:
- >
- > While I find it easy to *imagine* cyberspace when reading, for
- > instance, "Neuromancer" or anything similar, the idea itself,
- > on closer inspection, is rather naive.
- >
- > Take for instance the "Ice" concept of Neuromancer, to stick
- > with the classics. In order to know that something is somehow
- > 'protected' you must first *try* to break that protection;
- > otherwise you don't have any information about the "breakability"
- > of security systems. In that case, you cannot hope to represent
- > it.
- >
- > At present, the only way to find out how far you can break into
- > a secured network/database is to try it yourself, and that (as
- > we all know) involves a lot of clever hackerism. I could imagine
- > a 'sensory system' trying to log in as guest in any connected
- > network it can find, and representing the ones that do not
- > allow guest logins as 'Ice'. That would be unsatisfactory, however,
- > since there wouldn't be a noticeable difference between the
- > Pentagon and my colleague's unix account.
- >
- Could be that ICE (I believe it's an acronym) is not something that the
- protected party wants kept secret. Ever see security system stickers on
- people's cars, homes, etc...? An extremely ominous graphical
- representation of a data site's security (ICE) could help deter would be
- thiefs especially if certain ICE representations were particular to certain
- types of security. For example one could think of ICE makers... security
- companies that develop highly secure and deadly systems. By using the same
- type of graphical representaion for all of their handiwork for corporations
- in cyberspace could deter crime..."Boy that's a Cyberpuke (tm) Death Cloud.
- That ICE is dense and black! I'm not going in there without anything
- short of Chinese military ace breakers!"
-
- Get my drift?
-
- It also gives a legendary feel to being a console cowboy... "Did ya hear?
- Dixie Flatline burned a Cyberpuke for the Yakuza yesterday?"
-
- It doesn't seem so odd that security would be broadcast into a visible form
- in cyberspace. I agree that the best security is if the thief doesn't even
- know the data is there, but I think that would be near-impossible if we're
- talking mega-corps.
-
- Patrick
-