The Handbook of Information Security for Advanced Neuroprosthetics, 2nd Edition

The Handbook of Information Security for Advanced Neuroprosthetics by [Gladden, Matthew E.]
The Handbook of Information Security for Advanced Neuroprosthetics
by Matthew E. Gladden
Product details
File Size: 10816 KB
Publisher Finelybook 出版社: Synthypnion Academic; 2 edition (13 May 2017)
Sold By 作者:Amazon Media EU S.à r.l.
Language 语言: English
ASIN: B072LKPMXB

The Book Description robot was collected from Amazon and arranged by Finelybook

How does one ensure information security for a computer that is entangled with the structures and processes of a human brain – and for the human mind that is interconnected with such a device?
The need to provide information security for neuroprosthetic devices grows more pressing as increasing numbers of people utilize therapeutic technologies such as cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging neuroprosthetic technologies for human enhancement are expected to increasingly transform their human users’ sensory, motor, and cognitive capacities in ways that generate new ‘posthumanized’ sociotechnological realities. In this context, it is essential not only to ensure the information security of such neuroprostheses themselves but – more importantly – to ensure the psychological and physical health, autonomy, and personal identity of the human beings whose cognitive processes are inextricably linked with such devices. InfoSec practitioners must not only guard against threats to the confidentiality and integrity of data stored within a neuroprosthetic device’s internal memory; they must also guard against threats to the confidentiality and integrity of thoughts, memories, and desires existing within the mind the of the device’s human host.
This second edition of The Handbook of Information Security for Advanced Neuroprosthetics updates the previous edition’s comprehensive investigation of these issues from both theoretical and practical perspectives. It provides an introduction to the current state of neuroprosthetics and expected future trends in the field, along with an introduction to fundamental principles of information security and an analysis of how they must be re-envisioned to address the unique challenges posed by advanced neuroprosthetics. A two-dimensional cognitional security framework is presented whose security goals are designed to protect a device’s human host in his or her roles as a sapient metavolitional agent, embodied embedded organism, and social and economic actor. Practical consideration is given to information security responsibilities and roles within an organizational context and to the application of preventive, detective, and corrective or compensating security controls to neuroprosthetic devices, their host-device systems, and the larger supersystems in which they operate. Finally, it is shown that while implantable neuroprostheses create new kinds of security vulnerabilities and risks, they may also serve to enhance the information security of some types of human hosts (such as those experiencing certain neurological conditions).

Contents


Part I: Background and Foundations
Chapter 1: An Introduction to Advanced Neuroprosthetics
Chapter 2: An Introduction to Information Security in the Context of Advanced Neuroprosthetics
Chapter 3: Critical Challenges in Information Security for Advanced Neuroprosthetics
Chapter 4: A Two-dimensional Framework of Cognitional Security for Advanced Neuroprosthetics
Part II: Security Practices and Mechanisms for Advanced Neuroprosthetics
Chapter 5: InfoSec Roles and Responsibilities for the Securing of Neuroprosthetic Systems
Chapter 6: Preventive Security Controls for Neuroprosthetic Devices and Information Systems
Chapter 7: Detective Security Controls for Neuroprosthetic Devices and Information Systems
Chapter 8: Corrective and Compensating Security Controls for Neuroprosthetic Devices and Information Systems
图书说明
如何确保与人脑结构和过程纠缠在一起的计算机的信息安全以及与这种设备相互连接的人心?
随着越来越多的人使用诸如耳蜗植入物,视网膜假体,机器人假肢和深部脑刺激装置的治疗技术,为神经假体装置提供信息安全性的需要越来越迫切。此外,用于人类增强的新兴神经假体技术预计将以产生新的“后人类”社会技术现实的方式日益改变其用户的感官,运动和认知能力。在这种情况下,不仅要确保这种神经假体的信息安全,而且更重要的是确保认知过程与这些设备密切相关的人的心理和身体健康,自主和个人身份。 InfoSec从业人员不仅要防范存储在神经假体装置的内部存储器中的数据的机密性和完整性的威胁;他们还必须防止对设备人类主机心中存在的思想,记忆和欲望的保密性和完整性的威胁。
第二版“先进神经假肢信息安全手册”从理论和实践角度更新了上一期对这些问题的综合调查。它介绍了目前的神经假体状况和预期的未来发展趋势,同时介绍了信息安全的基本原理,并分析了如何重新设想,以解决先进的神经假体所带来的独特挑战。提出了一种二维认知安全框架,其安全目标旨在保护设备的人员作为自己的角色,作为一个聪明的偏移代理人,体现嵌入式生物体,以及社会和经济行为者。实际考虑到组织环境中的信息安全责任和角色,以及对神经假肢设备,其主机设备系统以及其操作的较大超系统的预防性,侦测性和纠正性或补偿性安全控制的应用。最后,可以看出,虽然可植入的神经假体产生新的安全漏洞和风险,但也可能会增强某些类型的人类宿主(如经历某些神经病症的人)的信息安全。
目录
第一部分:背景与基础
第1章:高级神经假体介绍
第二章:高级神经假体背景下的信息安全介绍
第3章:高级神经假体信息安全的关键挑战
第4章:高级神经假体认知安全的二维框架
第二部分:高级神经假体的安全实践和机制
第5章:InfoSec保护神经假体系统的作用和职责
第6章:神经假体装置和信息系统的预防性安全控制
第7章:神经假体设备和信息系统的侦测安全控制
第8章:矫正和补偿神经假体装置和信息系统的安全控制
The Handbook of Information Security for Advanced Neuroprosthetics 2nd Edition B072LKPMXB.pdf:
下载地址

http://cloud.finelybook.com/f/15081096-482455765-15e4f8

觉得文章有用就打赏一下文章作者
未经允许不得转载:finelybook » The Handbook of Information Security for Advanced Neuroprosthetics, 2nd Edition
分享到: 更多 (0)

评论 2

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
  1. #0

    链接失效

    135209201893周前 (02-14)回复

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

微信扫一扫打赏