The Handbook of Information Security for Advanced Neuroprosthetics, 2nd Edition Front Cover

The Handbook of Information Security for Advanced Neuroprosthetics, 2nd Edition

Description

How does one ensure information security for a computer that is entangled with the structures and processes of a human brain – and for the human mind that is interconnected with such a device?
The need to provide information security for neuroprosthetic devices grows more pressing as increasing numbers of people utilize therapeutic technologies such as cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging neuroprosthetic technologies for human enhancement are expected to increasingly transform their human users’ sensory, motor, and cognitive capacities in ways that generate new ‘posthumanized’ sociotechnological realities. In this context, it is essential not only to ensure the information security of such neuroprostheses themselves but – more importantly – to ensure the psychological and physical health, autonomy, and personal identity of the human beings whose cognitive processes are inextricably linked with such devices. InfoSec practitioners must not only guard against threats to the confidentiality and integrity of data stored within a neuroprosthetic device’s internal memory; they must also guard against threats to the confidentiality and integrity of thoughts, memories, and desires existing within the mind the of the device’s human host.
This second edition of The Handbook of Information Security for Advanced Neuroprosthetics updates the previous edition’s comprehensive investigation of these issues from both theoretical and practical perspectives. It provides an introduction to the current state of neuroprosthetics and expected future trends in the field, along with an introduction to fundamental principles of information security and an analysis of how they must be re-envisioned to address the unique challenges posed by advanced neuroprosthetics. A two-dimensional cognitional security framework is presented whose security goals are designed to protect a device’s human host in his or her roles as a sapient metavolitional agent, embodied embedded organism, and social and economic actor. Practical consideration is given to information security responsibilities and roles within an organizational context and to the application of preventive, detective, and corrective or compensating security controls to neuroprosthetic devices, their host-device systems, and the larger supersystems in which they operate. Finally, it is shown that while implantable neuroprostheses create new kinds of security vulnerabilities and risks, they may also serve to enhance the information security of some types of human hosts (such as those experiencing certain neurological conditions).

Table of Contents

Part I: Background and Foundations
Chapter 1: An Introduction to Advanced Neuroprosthetics
Chapter 2: An Introduction to Information Security in the Context of Advanced Neuroprosthetics
Chapter 3: Critical Challenges in Information Security for Advanced Neuroprosthetics
Chapter 4: A Two-dimensional Framework of Cognitional Security for Advanced Neuroprosthetics

Part II: Security Practices and Mechanisms for Advanced Neuroprosthetics
Chapter 5: InfoSec Roles and Responsibilities for the Securing of Neuroprosthetic Systems
Chapter 6: Preventive Security Controls for Neuroprosthetic Devices and Information Systems
Chapter 7: Detective Security Controls for Neuroprosthetic Devices and Information Systems
Chapter 8: Corrective and Compensating Security Controls for Neuroprosthetic Devices and Information Systems

To access the link, solve the captcha.