Cyborg Security: Difference between revisions

From Cyborg Anthro Wiki
Created page with 'Cyborg Security As we extend our technosocial selves online, our brains and extended delves become open to attack. Cyborg security is One will join a netwrk if they feel there …'
 
No edit summary
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Cyborg Security
[[Image:cyborg-security-Maggie-Nichols.jpg|center|600px]]


As we extend our technosocial selves online, our brains and extended delves become open to attack.
===Definition===
The extension of the self brings with it an entire new dimension of security concerns. As we extend our technosocial selves online, our brains and extended selves become open to social and physical access. Cyborg Security is a phrase used to describe a set of practices and tools for protecting the extended self and its data. As researcher [[danah boyd]] discovered, some teenagers are known to disable their Facebook accounts when they go offline. This is to prevent people from posting on their wall when they're not there to defend it. This practice, also known as "super-logoff"<ref>boyd, danah. Risk Reduction Strategies on Facebook. Zephoria.org. Accessed June 5, 2011. http://www.zephoria.org/thoughts/archives/2010/11/08/risk-reduction-strategies-on-facebook.html</ref> is an example of a risk reduction strategy on Facebook.


Cyborg security is
==References==
One will join a netwrk if they feel there is peace of mind available.
<references />
---


Hey there, you don't know me. But I've chatted with Deborah Heath and a
[[Category:Book Pages]]
few other folks and they've led me to you. I've also seen you talk at
[[Category:Finished]]
Ignite portland I think.
[[Category:Illustrated]]
 
I'm a security researcher working for Intel but that's really besides
the point. I'm writing you to ask about some of your material concerning
cyborgs and the trends for humans to modify themselves using
technology. Next month I'm giving a talk at Shmoocon, a security
conference in DC (http://www.shmoocon.org) about Cyborg information
security. The gist of my talk will be a review of the information
security threats and vulnerabilities for Cyborgs present and future.
I'll be focusing on what new threats are possible against humans
modified with technology. IE, What can a hacker attack and how. And Also
taking a look at what defenses do we bring as humans to this area. IE,
can we meditate our way out of a hack attack against our pacemaker or
our can we use cognitive tricks to defend against attacks against our
cyber eyes or neural implants.
 
It's all pretty interesting and fun topics to be looking at.
 
I've seen some of your work on cyborgs, but what I'm interested in from
you is a framework for how you slice up the Cyborg world. What I mean by
this is getting some better sense of how the realm of Human modification
might be understood in terms of Implant type and Function. I'm currently
looking at it this way: Implant types: Cosmetic, Physical, Sensory, and
Cognitive vs Function: Restorative, Enhancement, and Augment. Where
Restore means something like "make us whole again", Enhance means make a
capability better, and Augment means Add a new capability. Does this
make any sense and do you know of any attempts to categorize or build a
framework around how we modify ourselves as humans?

Latest revision as of 06:41, 14 October 2011

Definition

The extension of the self brings with it an entire new dimension of security concerns. As we extend our technosocial selves online, our brains and extended selves become open to social and physical access. Cyborg Security is a phrase used to describe a set of practices and tools for protecting the extended self and its data. As researcher danah boyd discovered, some teenagers are known to disable their Facebook accounts when they go offline. This is to prevent people from posting on their wall when they're not there to defend it. This practice, also known as "super-logoff"[1] is an example of a risk reduction strategy on Facebook.

References

  1. boyd, danah. Risk Reduction Strategies on Facebook. Zephoria.org. Accessed June 5, 2011. http://www.zephoria.org/thoughts/archives/2010/11/08/risk-reduction-strategies-on-facebook.html