home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!das.wang.com!ulowell!m2c!nic.umass.edu!noc.near.net!hri.com!spool.mu.edu!yale.edu!ira.uka.de!math.fu-berlin.de!news.netmbx.de!Germany.EU.net!mcsun!sun4nl!rulway.LeidenUniv.nl!rulfsw!ruiter
- From: ruiter@rulfsw.leidenuniv.nl
- Newsgroups: alt.cyberspace
- Subject: representing Ice?
- Message-ID: <1993Jan26.211402.1@rulfsw.leidenuniv.nl>
- Date: 26 Jan 93 20:14:02 GMT
- Sender: news@rulway.LeidenUniv.nl (Usenet news account)
- Organization: Leiden University Faculty of Social Sciences
- Lines: 35
- Nntp-Posting-Host: rulfsw
-
- While I find it easy to *imagine* cyberspace when reading, for
- instance, "Neuromancer" or anything similar, the idea itself,
- on closer inspection, is rather naive.
-
- Take for instance the "Ice" concept of Neuromancer, to stick
- with the classics. In order to know that something is somehow
- 'protected' you must first *try* to break that protection;
- otherwise you don't have any information about the "breakability"
- of security systems. In that case, you cannot hope to represent
- it.
-
- At present, the only way to find out how far you can break into
- a secured network/database is to try it yourself, and that (as
- we all know) involves a lot of clever hackerism. I could imagine
- a 'sensory system' trying to log in as guest in any connected
- network it can find, and representing the ones that do not
- allow guest logins as 'Ice'. That would be unsatisfactory, however,
- since there wouldn't be a noticeable difference between the
- Pentagon and my colleague's unix account.
-
- As an example, consider trying every lock you can locate with the
- same key. Normally, no lock will open with that key. The only way
- to find any *difference* between the security of locks is to have
- a professional burglar try them all, and have her make a report
- about the 'hardness' of the locks involved.
-
- To go back to cyberspace, representing "Ice" would involve automating
- (to a high degree) the process of trying to break into a system.
-
- Maybe I'm mistaken (in which case I'd like a pointer to the relevant
- software) but I believe that this is not possible.
-
-
- Jan P. de Ruiter
- ruiter@ruls41.LeidenUniv.nl
-