Knowledge

Intrusion Countermeasures Electronics

Source 📝

742: 582:, an item called "ICE Breaker" can be obtained and used as a hacking tool during a sequence on the Leviathan, in which the player chooses one character to remain behind and attempt to rescue the other captured party members. 620:, wherein "ICE" is used intermittently with "firewalls" to reference mainframe defenses which the player-controlled AI program Incognita breaks through to take control of enemy electronics. 533: 598:, where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations. 274:
understand ICE to be an acronym for "Intrusion Countermeasures Electronics", the runner viewpoint is that the acronym should be for "Insidious Cortical Electrocution"
1026: 898: 306:, where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE. 142:
and cyberpunk literature. "The Gibsonian concept of cyberspace fed back into both computer and information systems design and theory," wrote Roger Burrows.
578: 349:
by Melissa Scott, wherein IC(E) refers to Intrusion Countermeasures (Electronic), solving the problem of implying that the measures are hardware-based
134:
concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a
170:
The Java bytecode verifier in the Apache ByteCode Engineering Library (BCEL) is called JustIce (see the 'docs' folder for documentation).
468:
features an item called "Hacker ICE-Breaker Source", which can be further upgraded to "Intrusion Countermeasure Electronics Upgrade".
1001: 1297: 840: 923: 726:
Wall, D.S. (2012). "The Devil Drives a Lada: the social construction of hackers as cybercriminals". In Gregoriou, C. (ed.).
167:, an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine". 1484: 570:
has the player break into various cyberspace systems, which involves fighting the "ICE" security programs in the form of a
100:
refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be
902: 130:
and similar programs fall under this classification, the term has little real world significance and remains primarily a
1363: 658: 1324: 1105: 710: 174:
On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the
1338: 1021: 497:
uses the term to refer to defensive countermeasures that prevent netrunners and cyberware from hacking a target.
1524: 877: 1331: 157: 1317: 1221: 994: 1124: 481:
uses the term to describe the technology protecting the characters' "brain chips" and virtual structures.
1490: 529:, where "ICE" in its RPG part refers to shields or armor that can be attacked by various "ICE breaker"s 521:
uses "Black Ice" as a construction material during a cyberspace hacking minigame in the Far Harbor DLC.
153: 117: 39: 17: 1514: 1356: 1242: 562:, features an ICE pick, to hack enemy cameras, turrets, and robots and use them against enemy forces. 862: 270:
setting, where the corporate player uses ICE and the runner player uses icebreakers; while corps in
1452: 1198: 541: 509: 449: 337: 301: 1519: 1235: 987: 817: 790: 610: 489:
uses the term to describe the technology the player must overcome when hacking a computer system.
345: 101: 1460: 1284: 1270: 525: 410: 212: 186:
by the federal government, including the establishment of the National Office for Cyberspace.
1468: 1186: 614:, where items are protected by various levels of ICE that the player must overcome to access. 537:, where "ICE" is an umbrella term for security measures that shield nodes from being accessed 472: 123: 96:
environment, these constructs are often represented by actual walls of ice, stone, or metal.
501: 395: 288: 183: 175: 8: 1068: 566: 219: 127: 1256: 850: 442: 295: 278: 226: 965: 827:. Lecture Notes in Computer Science. Vol. 1267. Springer-Verlag. pp. 69–82. 764: 1291: 1277: 836: 706: 631: 558: 550: 113: 828: 77:, as well as Gibson's own acknowledgements, the term ICE was originally coined by 1421: 1400: 1228: 927: 663: 617: 372: 131: 93: 1426: 1380: 1263: 1249: 1191: 1167: 1159: 1080: 1043: 1010: 692: 602: 493: 464: 360: 330: 266: 55: 51: 1508: 1477: 1436: 1395: 1385: 1132: 1089: 423: 245:, though in it "ICE" stands for "Integrated Cyber Environment", referring to 668: 1140: 949: 594: 586: 571: 241: 230:, where ICE is referred to directly by name or else as an 'Attack Barrier'. 164: 1052: 697: 590:
features an ability called Black Ice, which the Hacker character may use.
317: 74: 69: 1416: 1060: 899:"ICE Act would restructure cybersecurity rule, create White House post" 832: 505:, where the player's hacking program is referred to as an "ICE Breaker" 418: 325: 246: 179: 139: 90: 78: 60: 702: 606:, where an item that auto-hacks electronics is known as an "ICE-Pick" 517: 478: 437: 379: 260: 199: 156:
built by a California company named Network ICE in 1999, acquired by
138:. On the other hand, there is a strong connection between real-world 31: 34:
literature to refer to security programs which protect computerized
1390: 485: 384: 135: 979: 145:
The term ICE has occasionally been used for real-world software:
882: 1097: 65: 387:) but is colloquially named "Ice" by hackers in the setting 35: 546:
where ICE, BlackICE, and ICE Breaking are highly featured.
426:
says in a club that he is the hacker known as "IceBreaker"
513:, wherein there are security programs called "ICE walls" 554:, where players use ICE technology to bypass security. 341:, wherein black ICE is used to defend the TechnoCore 916: 453:, in the episode "Security Systems", April 21, 1987 249:, rather than Intrusion Countermeasures Electronics 383:, called IC (The setting drops the "electronics" 1506: 16:"Black ICE" redirects here. For other uses, see 748:. In Westwood, Sallie; Williams, John (eds.). 691: 995: 687: 685: 818:"The design of the ICE encryption algorithm" 653: 651: 649: 941: 635:, icewalls are a standard security measure. 1002: 988: 750:Imagining Cities: Scripts, signs, memories 682: 646: 762: 740: 1507: 896: 579:Star Wars: Knights of the Old Republic 1432:Intrusion Countermeasures Electronics 983: 890: 752:. London: Routledge. pp. 235–48. 84: 24:Intrusion Countermeasures Electronics 1485:William Gibson: A Literary Companion 815: 730:. Palgrave Macmillan. pp. 4–18. 725: 353: 897:Howard, Alexander B. (2009-04-28). 788: 189: 182:to make changes to the handling of 107: 13: 1009: 901:. SearchCompliance. Archived from 321:, original popularizer of the term 58:", which also introduced the term 14: 1536: 1325:Disneyland with the Death Penalty 875: 791:"IBM kills off BlackICE firewall" 414:, mentioned in the opening crawl. 45: 282:, an adaptation of the original 1339:Distrust That Particular Flavor 958: 1027:List of awards and nominations 926:. OpenCongress. Archived from 924:"S.921 - U.S. ICE Act of 2009" 869: 809: 782: 763:Edwards, M (8 December 1999). 756: 734: 719: 457: 393:, a roleplaying game based on 1: 1332:No Maps for These Territories 639: 624: 430: 310: 253: 158:IBM Internet Security Systems 1318:Agrippa (A Book of the Dead) 1222:Fragments of a Hologram Rose 743:"Cyberpunk as Social Theory" 667:. 2003-10-27. Archived from 160:, then discontinued in 2007. 50:The term was popularized by 7: 234: 10: 1541: 154:intrusion detection system 118:Intrusion detection system 111: 18:black ice (disambiguation) 15: 1445: 1409: 1373: 1348: 1309: 1213: 1178: 1151: 1116: 1079: 1042: 1035: 1017: 728:The Construction of Crime 403: 303:Hacker II - The Dark Side 825:Fast Software Encryption 205: 102:artificially intelligent 64:, and in his subsequent 1236:The Gernsback Continuum 741:Burrows, Roger (1997). 391:Shadow of the Beanstalk 346:Trouble and Her Friends 38:from being accessed by 1271:Red Star, Winter Orbit 1106:All Tomorrow's Parties 954:. Season 1. Episode 4. 816:Kwan, Matthew (1997). 422:, wherein a friend of 213:Cyberpunk: Edgerunners 1525:Fiction about malware 1187:The Difference Engine 473:AI: The Somnium Files 1364:First Person Shooter 329:the second novel of 184:information security 176:United States Senate 54:in his short story " 30:) is a term used in 1125:Pattern Recognition 1069:Mona Lisa Overdrive 948:"Fire and I.C.E.". 220:Cyber City Oedo 808 128:anti-virus software 85:Description of ICE 73:. According to the 1257:The Belonging Kind 833:10.1007/BFb0052335 443:Born to the Purple 441:, in the episode " 368:card game is based 279:Android: Netrunner 227:Ghost in the Shell 198:is widely used in 1502: 1501: 1278:The Winter Market 1209: 1208: 970:StarCrawlers Wiki 842:978-3-540-63247-4 797:. CBS Interactive 632:Schlock Mercenary 559:Project Snowblind 551:Perfect Dark Zero 534:Midnight Protocol 364:, upon which the 354:Roleplaying games 122:Though real-life 114:Computer security 89:When viewed in a 1532: 1515:Cyberpunk themes 1446:Derivative works 1117:Blue Ant trilogy 1040: 1039: 1004: 997: 990: 981: 980: 974: 973: 962: 956: 955: 945: 939: 938: 936: 935: 920: 914: 913: 911: 910: 894: 888: 887: 873: 867: 866: 860: 856: 854: 846: 822: 813: 807: 806: 804: 802: 786: 780: 779: 777: 775: 760: 754: 753: 747: 738: 732: 731: 723: 717: 716: 689: 680: 679: 677: 676: 655: 333:"Sprawl trilogy" 331:William Gibson's 190:Usage in fiction 108:Real-world usage 1540: 1539: 1535: 1534: 1533: 1531: 1530: 1529: 1505: 1504: 1503: 1498: 1462:Johnny Mnemonic 1441: 1422:Megacorporation 1405: 1401:Hubertus Bigend 1369: 1344: 1305: 1229:Johnny Mnemonic 1205: 1174: 1147: 1112: 1075: 1031: 1013: 1008: 978: 977: 964: 963: 959: 947: 946: 942: 933: 931: 922: 921: 917: 908: 906: 895: 891: 874: 870: 858: 857: 848: 847: 843: 820: 814: 810: 800: 798: 789:Naraine, Ryan. 787: 783: 773: 771: 761: 757: 745: 739: 735: 724: 720: 713: 690: 683: 674: 672: 664:The Jargon File 657: 656: 647: 642: 627: 618:Invisible, Inc. 460: 433: 411:Johnny Mnemonic 406: 373:GURPS Cyberpunk 356: 313: 256: 237: 208: 192: 132:science fiction 120: 112:Main articles: 110: 94:virtual reality 87: 48: 21: 12: 11: 5: 1538: 1528: 1527: 1522: 1520:William Gibson 1517: 1500: 1499: 1497: 1496: 1492:The Peripheral 1488: 1481: 1474: 1470:New Rose Hotel 1466: 1458: 1449: 1447: 1443: 1442: 1440: 1439: 1434: 1429: 1424: 1419: 1413: 1411: 1410:Story elements 1407: 1406: 1404: 1403: 1398: 1393: 1388: 1383: 1381:Molly Millions 1377: 1375: 1371: 1370: 1368: 1367: 1360: 1352: 1350: 1346: 1345: 1343: 1342: 1335: 1328: 1321: 1313: 1311: 1307: 1306: 1304: 1303: 1299:Burning Chrome 1295: 1292:Skinner's Room 1288: 1281: 1274: 1267: 1264:Burning Chrome 1260: 1253: 1250:New Rose Hotel 1246: 1239: 1232: 1225: 1217: 1215: 1211: 1210: 1207: 1206: 1204: 1203: 1195: 1192:Bruce Sterling 1182: 1180: 1176: 1175: 1173: 1172: 1164: 1160:The Peripheral 1155: 1153: 1152:Jackpot series 1149: 1148: 1146: 1145: 1137: 1129: 1120: 1118: 1114: 1113: 1111: 1110: 1102: 1094: 1085: 1083: 1081:Bridge trilogy 1077: 1076: 1074: 1073: 1065: 1057: 1048: 1046: 1044:Sprawl trilogy 1037: 1033: 1032: 1030: 1029: 1024: 1018: 1015: 1014: 1011:William Gibson 1007: 1006: 999: 992: 984: 976: 975: 957: 940: 915: 889: 876:Haase, Enver. 868: 859:|journal= 841: 808: 781: 755: 733: 718: 711: 693:William Gibson 681: 644: 643: 641: 638: 637: 636: 626: 623: 622: 621: 615: 607: 603:System Shock 2 599: 591: 583: 575: 563: 555: 547: 538: 530: 522: 514: 506: 498: 494:Cyberpunk 2077 490: 482: 476: 469: 465:Anarchy Online 459: 456: 455: 454: 446: 432: 429: 428: 427: 415: 405: 402: 401: 400: 388: 376: 369: 361:Cyberpunk 2020 355: 352: 351: 350: 342: 334: 322: 312: 309: 308: 307: 293: 275: 267:Cyberpunk 2020 255: 252: 251: 250: 236: 233: 232: 231: 223: 216: 207: 204: 191: 188: 172: 171: 168: 161: 109: 106: 86: 83: 56:Burning Chrome 52:William Gibson 47: 46:Origin of term 44: 9: 6: 4: 3: 2: 1537: 1526: 1523: 1521: 1518: 1516: 1513: 1512: 1510: 1495: 1493: 1489: 1487: 1486: 1482: 1480: 1479: 1478:Node Magazine 1475: 1473: 1471: 1467: 1465: 1463: 1459: 1457: 1455: 1451: 1450: 1448: 1444: 1438: 1437:Raygun Gothic 1435: 1433: 1430: 1428: 1425: 1423: 1420: 1418: 1415: 1414: 1412: 1408: 1402: 1399: 1397: 1396:Cayce Pollard 1394: 1392: 1389: 1387: 1386:Bobby Newmark 1384: 1382: 1379: 1378: 1376: 1372: 1365: 1361: 1358: 1354: 1353: 1351: 1347: 1341: 1340: 1336: 1334: 1333: 1329: 1326: 1322: 1320: 1319: 1315: 1314: 1312: 1308: 1302: 1300: 1296: 1293: 1289: 1286: 1282: 1279: 1275: 1272: 1268: 1265: 1261: 1258: 1254: 1251: 1247: 1244: 1240: 1237: 1233: 1230: 1226: 1223: 1219: 1218: 1216: 1214:Short stories 1212: 1201: 1200: 1196: 1193: 1189: 1188: 1184: 1183: 1181: 1177: 1170: 1169: 1165: 1162: 1161: 1157: 1156: 1154: 1150: 1143: 1142: 1138: 1135: 1134: 1133:Spook Country 1130: 1127: 1126: 1122: 1121: 1119: 1115: 1108: 1107: 1103: 1100: 1099: 1095: 1092: 1091: 1090:Virtual Light 1087: 1086: 1084: 1082: 1078: 1071: 1070: 1066: 1063: 1062: 1058: 1055: 1054: 1050: 1049: 1047: 1045: 1041: 1038: 1034: 1028: 1025: 1023: 1022:List of works 1020: 1019: 1016: 1012: 1005: 1000: 998: 993: 991: 986: 985: 982: 971: 967: 961: 953: 952: 944: 930:on 2010-08-31 929: 925: 919: 905:on 2009-11-08 904: 900: 893: 885: 884: 879: 872: 864: 852: 844: 838: 834: 830: 826: 819: 812: 796: 792: 785: 770: 766: 759: 751: 744: 737: 729: 722: 714: 712:0-441-56959-5 708: 704: 700: 699: 694: 688: 686: 671:on 2008-12-04 670: 666: 665: 660: 654: 652: 650: 645: 634: 633: 629: 628: 619: 616: 613: 612: 608: 605: 604: 600: 597: 596: 592: 589: 588: 584: 581: 580: 576: 573: 569: 568: 564: 561: 560: 556: 553: 552: 548: 545: 543: 539: 536: 535: 531: 528: 527: 523: 520: 519: 515: 512: 511: 507: 504: 503: 499: 496: 495: 491: 488: 487: 483: 480: 477: 475: 474: 470: 467: 466: 462: 461: 452: 451: 447: 444: 440: 439: 435: 434: 425: 424:Kevin Mitnick 421: 420: 416: 413: 412: 408: 407: 398: 397: 392: 389: 386: 382: 381: 377: 375: 374: 370: 367: 363: 362: 358: 357: 348: 347: 343: 340: 339: 335: 332: 328: 327: 323: 320: 319: 315: 314: 305: 304: 299: 298: 294: 291: 290: 285: 281: 280: 276: 273: 269: 268: 263: 262: 258: 257: 248: 244: 243: 239: 238: 229: 228: 224: 222: 221: 217: 215: 214: 210: 209: 203: 201: 197: 187: 185: 181: 177: 169: 166: 162: 159: 155: 151: 148: 147: 146: 143: 141: 137: 133: 129: 125: 119: 115: 105: 103: 99: 95: 92: 82: 80: 76: 72: 71: 67: 63: 62: 57: 53: 43: 41: 37: 33: 29: 25: 19: 1491: 1483: 1476: 1469: 1461: 1453: 1431: 1427:Locative art 1337: 1330: 1316: 1298: 1197: 1185: 1166: 1158: 1141:Zero History 1139: 1131: 1123: 1104: 1096: 1088: 1067: 1059: 1051: 969: 960: 951:Phantom 2040 950: 943: 932:. Retrieved 928:the original 918: 907:. Retrieved 903:the original 892: 881: 871: 824: 811: 799:. Retrieved 794: 784: 772:. Retrieved 768: 758: 749: 736: 727: 721: 696: 673:. Retrieved 669:the original 662: 630: 609: 601: 595:System Shock 593: 587:StarCrawlers 585: 577: 572:rail shooter 565: 557: 549: 540: 532: 524: 516: 508: 500: 492: 484: 471: 463: 450:Max Headroom 448: 436: 417: 409: 394: 390: 378: 371: 365: 359: 344: 336: 324: 316: 302: 296: 287: 283: 277: 271: 265: 259: 242:Phantom 2040 240: 225: 218: 211: 195: 193: 173: 149: 144: 121: 97: 88: 68: 59: 49: 27: 23: 22: 1454:Neuromancer 1357:Kill Switch 1243:Hinterlands 1053:Neuromancer 769:ITPro Today 698:Neuromancer 542:Neuromancer 458:Video games 318:Neuromancer 264:, based on 178:by Senator 75:Jargon File 70:Neuromancer 1509:Categories 1456:video game 1417:Cyberspace 1374:Characters 1349:Television 1310:Nonfiction 1301:collection 1061:Count Zero 934:2010-05-07 909:2010-05-07 765:"BlackICE" 675:2008-11-21 640:References 625:Web comics 611:The Ascent 431:Television 419:Track Down 326:Count Zero 311:Literature 254:Card games 247:cyberspace 180:Tom Carper 165:ICE cipher 140:cybercrime 91:cyberspace 79:Tom Maddox 61:cyberspace 1494:TV series 1199:Archangel 878:"JustIce" 861:ignored ( 851:cite book 703:Ace Books 526:Mr. Robot 518:Fallout 4 479:Baldr Sky 438:Babylon 5 380:Shadowrun 366:Netrunner 284:Netrunner 272:Netrunner 261:Netrunner 202:fiction. 200:cyberpunk 194:The term 124:firewalls 98:Black ICE 32:cyberpunk 1391:Rei Toei 1285:Dogfight 1194:) (1990) 966:"Hacker" 695:(1984). 510:Dystopia 486:BloodNet 399:universe 385:misnomer 338:Hyperion 286:for the 235:Cartoons 150:BlackICE 136:misnomer 801:16 July 774:16 July 502:Deus Ex 396:Android 292:setting 289:Android 40:hackers 1202:(2016) 1190:(with 1171:(2020) 1168:Agency 1163:(2014) 1144:(2010) 1136:(2007) 1128:(2003) 1109:(1999) 1101:(1996) 1093:(1993) 1072:(1988) 1064:(1986) 1056:(1984) 1036:Novels 883:GitHub 839:  709:  567:Ripper 404:Movies 297:Hacker 1179:Other 1098:Idoru 821:(PDF) 795:ZDNet 746:(PDF) 659:"Ice" 206:Anime 152:, an 66:novel 1472:film 1464:film 863:help 837:ISBN 803:2020 776:2020 707:ISBN 300:and 163:The 116:and 36:data 829:doi 196:ICE 28:ICE 1511:: 968:. 880:. 855:: 853:}} 849:{{ 835:. 823:. 793:. 767:. 705:. 701:. 684:^ 661:. 648:^ 126:, 104:. 81:. 42:. 1366:" 1362:" 1359:" 1355:" 1327:" 1323:" 1294:" 1290:" 1287:" 1283:" 1280:" 1276:" 1273:" 1269:" 1266:" 1262:" 1259:" 1255:" 1252:" 1248:" 1245:" 1241:" 1238:" 1234:" 1231:" 1227:" 1224:" 1220:" 1003:e 996:t 989:v 972:. 937:. 912:. 886:. 865:) 845:. 831:: 805:. 778:. 715:. 678:. 574:. 544:, 445:" 26:( 20:.

Index

black ice (disambiguation)
cyberpunk
data
hackers
William Gibson
Burning Chrome
cyberspace
novel
Neuromancer
Jargon File
Tom Maddox
cyberspace
virtual reality
artificially intelligent
Computer security
Intrusion detection system
firewalls
anti-virus software
science fiction
misnomer
cybercrime
intrusion detection system
IBM Internet Security Systems
ICE cipher
United States Senate
Tom Carper
information security
cyberpunk
Cyberpunk: Edgerunners
Cyber City Oedo 808

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.