Difference between revisions of "Cyborg Security"

From Cyborg Anthropology
Jump to: navigation, search
(Created page with 'Cyborg Security As we extend our technosocial selves online, our brains and extended delves become open to attack. Cyborg security is One will join a netwrk if they feel there …')
 
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Cyborg Security
+
[[Image:cyborg-security-Maggie-Nichols.jpg|center|600px]]
  
As we extend our technosocial selves online, our brains and extended delves become open to attack.
+
===Definition===
 +
The extension of the self brings with it an entire new dimension of security concerns. As we extend our technosocial selves online, our brains and extended selves become open to social and physical access. Cyborg Security is a phrase used to describe a set of practices and tools for protecting the extended self and its data. As researcher [[danah boyd]] discovered, some teenagers are known to disable their Facebook accounts when they go offline. This is to prevent people from posting on their wall when they're not there to defend it. This practice, also known as "super-logoff"<ref>boyd, danah. Risk Reduction Strategies on Facebook. Zephoria.org. Accessed June 5, 2011. http://www.zephoria.org/thoughts/archives/2010/11/08/risk-reduction-strategies-on-facebook.html</ref> is an example of a risk reduction strategy on Facebook.
  
Cyborg security is
+
==References==
One will join a netwrk if they feel there is peace of mind available.
+
<references />
---
+
  
Hey there, you don't know me. But I've chatted with Deborah Heath and a
+
[[Category:Book Pages]]
few other folks and they've led me to you. I've also seen you talk at
+
[[Category:Finished]]
Ignite portland I think.
+
[[Category:Illustrated]]
 
+
I'm a security researcher working for Intel but that's really besides
+
the point. I'm writing you to ask about some of your material concerning
+
cyborgs and the trends for humans to modify themselves using
+
technology. Next month I'm giving a talk at Shmoocon, a security
+
conference in DC (http://www.shmoocon.org) about Cyborg information
+
security. The gist of my talk will be a review of the information
+
security threats and vulnerabilities for Cyborgs present and future.
+
I'll be focusing on what new threats are possible against humans
+
modified with technology. IE, What can a hacker attack and how. And Also
+
taking a look at what defenses do we bring as humans to this area. IE,
+
can we meditate our way out of a hack attack against our pacemaker or
+
our can we use cognitive tricks to defend against attacks against our
+
cyber eyes or neural implants.
+
 
+
It's all pretty interesting and fun topics to be looking at.
+
 
+
I've seen some of your work on cyborgs, but what I'm interested in from
+
you is a framework for how you slice up the Cyborg world. What I mean by
+
this is getting some better sense of how the realm of Human modification
+
might be understood in terms of Implant type and Function. I'm currently
+
looking at it this way: Implant types: Cosmetic, Physical, Sensory, and
+
Cognitive vs Function: Restorative, Enhancement, and Augment. Where
+
Restore means something like "make us whole again", Enhance means make a
+
capability better, and Augment means Add a new capability. Does this
+
make any sense and do you know of any attempts to categorize or build a
+
framework around how we modify ourselves as humans?
+

Latest revision as of 02:41, 14 October 2011

Cyborg-security-Maggie-Nichols.jpg

Definition

The extension of the self brings with it an entire new dimension of security concerns. As we extend our technosocial selves online, our brains and extended selves become open to social and physical access. Cyborg Security is a phrase used to describe a set of practices and tools for protecting the extended self and its data. As researcher danah boyd discovered, some teenagers are known to disable their Facebook accounts when they go offline. This is to prevent people from posting on their wall when they're not there to defend it. This practice, also known as "super-logoff"[1] is an example of a risk reduction strategy on Facebook.

References

  1. boyd, danah. Risk Reduction Strategies on Facebook. Zephoria.org. Accessed June 5, 2011. http://www.zephoria.org/thoughts/archives/2010/11/08/risk-reduction-strategies-on-facebook.html