Cyber Security at the Cinema

Published on June 2016 | Categories: Documents | Downloads: 42 | Comments: 0 | Views: 623
of 46
Download PDF   Embed   Report

Comments

Content

Cyber Security at the Cinema
by Adrian Mikeliunas, CISSP, CLP [email protected]

Agenda
Movie Selection Criteria  Overview of Cyber Security  Top 7 Movie List  Honorary Mentions  Conclusion


01/19/10

2

Movies


Movies provide
Entertainment  Education




Many movies show how to:
Break computer security,  Hack, cheat, steal…


  Helps us get more prepared   Work becomes more
01/19/10

challenging

3

Selection Criteria
Hacker has to be one of the main characters or movie ideas  A Hacker is one who:


is proficient at using or programming a computer; a computer buff.  uses programming skills to gain illegal access to a computer network or file




Two or more cyber security events in the movie (hacking, cracking, …)

Cyber Security Events
   

Bypass Access controls
 ID,

Passwords, back doors, Biometrics Storage, Encryption

Bypass Physical Security
 Personnel,

Tamper Communications
 Electronic

commerce, Mail, Documents

Tamper Systems Development
 Change

crypto

controls, malware protection,

01/19/10

5

What is Cyber Security?


Computer Security [TECHNOLOGY]
Access & Passwords  Hacking / Cracking  Viruses, Worms, & Trojans




Social Engineering [HUMAN]
Personal Information  Medical Records  Personnel & Financial data  Spam, Scams & Phishing http://www.antiphishing.org


01/19/10

6

Weakest Security Link


Human Element? Computer Element? Both?





Top Cyber Security Movies
War Games  Hackers  The Net  Matrix Trilogy  Sneakers  Tron


War Games-1983
A young man finds a back door into a military central computer in which reality is confused with gameplaying, possibly starting World War III The main debate is: should humans be in charge of launching a nuclear strike or should a (fail safe) computer decide? Simple special effects, but realistic for that time. Movie grossed $75M.






War Games-(2)
War Dialing: kids wants to connect to game company  Back Door: modem access was for developer  Easy to guess Password: Joshua  Denial of Service: play tic-tac-toe to prove that in a nuclear war nobody wins!


The Net-1995
 





Angela Bennett is a software engineer working from home in Reston A client sends her a game program with a weird glitch for her to debug. On his way to meet her, he’s killed in a plane crash Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record.

The Net (2)
Identity Theft has become #1 crime in the world  Many commercial programs contain Easter Eggs (or backdoors) http://www.eeggs.com  Angela uses a keylogger & virus at the end to payback her attackers


Hackers-1995






A young boy is arrested by the Secret Service for writing a virus, and banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus. Unreal special “hacking” effects!

Hackers (2)


Remote take over of other computer systems
TV Station  School fire alarm system  Corporate Mainframe




Hacking in many instances

Matrix-1999
A group of rebels free Neo, a computer hacker, in hope that he can stop the Matrix, a computer system that slaves mankind.  In the second movie, Trinity uses a special hacking tool: nmap  Great Sci-Fi trilogy, many special effects


Matrix (2)
Neo is a hacker who gets hacked by Trinity in order to communicate inside the Matrix  Trinity shuts down the power plant grid by exploiting an SSH vulnerability  He goes back in to fight the agents and the Matrix, going out via a regular phone line…


Sneakers-1993
Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.  They recover a box that has the capability to decode all existing encryption systems around the world


TRON-1982
A hacker is literally abducted into the world of a computer and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program.  TRON (trace on) defeats the MCP (master control program) so his user can retrieve the stolen video game copyrights he owned.


Honorable Mentions
Swordfish  The Italian Job  Catch me if you can  Take Down  Independence Day  Gathaka  Charlie’s Angels


Swordfish-2001
The D.E.A. shut down its dummy corporation operation codenamed SWORDFISH in 1986, with $400M…  The world's most dangerous spy is hired by the CIA to coerce a computer hacker recently released from prison to help steal billions in unused government funds, but it's all locked away behind super-encryption.


Takedown-2000
Kevin Mitnick is quite possibly the most well known hacker in the world  Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges  When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...


Conclusion
Cyber Security is always under attack, prevention can help  Protect your password  Protect your company information assets & your personal information  Get informed & Get Involved!


01/19/10

New Information Security Policy http://infosec  New Information Security Training http://ISO17799


46

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close