hackers and hollywood 2: considering televisual cyberthreats in security risk analysis

96
Hackers and Hollywood 2: idering Televisual Cyberth In Security Risk Analysis

Post on 21-Oct-2014

1.010 views

Category:

Entertainment & Humor


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hackers and Hollywood 2:Considering Televisual Cyberthreats

In Security Risk Analysis

Page 2: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR

APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.

THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR

APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.

www.filmratings.com www.mpaa.comwww.filmratings.com www.mpaa.com

Page 3: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

ComingSoon

Page 4: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

to a computer near you

Page 5: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Dublin Institute of Technology proudly presents…

Page 6: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Damian Gordon

production

a

Page 7: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 8: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 9: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hackers and HollywoodConsidering Televisual Cyberthreats

In Security Risk Analysis

Page 10: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hackers and HollywoodConsidering Televisual Cyberthreats

In Security Risk Analysis

Page 11: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

But first, a story

Page 12: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 13: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Years and years ago…

Page 14: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Years and years ago…

UNNAMED ORGANISATION

Page 15: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Years and years ago…

me

My boss

My boss’s boss

Owner

Page 16: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Years and years ago…

me

My boss

My boss’s boss

Owner

Page 17: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Years and years ago…

me

My boss

My boss’s boss

Owner

Page 18: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

First task…

Create security policies for 14 companies

Page 19: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

= bewilderment

Page 20: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Security Policy

Security Policy

Risk Analysis

Page 21: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

Page 22: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

Page 23: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hackers on Television

Page 24: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The work

• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.

Page 25: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 26: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

“I’ll create a GUI interface using Visual

Basic…see if I can track an IP address.”

Page 27: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hacker vs Hacker

Page 28: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Data Collection

Page 29: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hermeneutic Phenomenology

Page 30: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Six Principles

Page 31: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The show must feature a hacker in it, and the hacker must be well-developed character

I

Page 32: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Once a hacker character has been shown to hack a few times, they don’t

have to hack in each episode to be still

considered a hacker.

II

Page 33: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

No animated television shows will be considered.

III

Page 34: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

If a show introduces a hacker group, all the

members are counted, even if only some of

them are shown hacking.

IV

Page 35: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

When a hacker appears on a different TV show, they don’t need to be

shown to be hacking in the new show for it to

count.

V

Page 36: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

No hacker documentaries will

be considered, only television

shows.

VI

Page 37: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Resulting in…

Page 38: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

80 Television Shows• The Avengers• Doctor Who• Star Trek• The Man from U.N.C.L.E• The Prisoner• Dragnet 1969• The Sweeney • Wonder Woman• Blake's 7• Simon & Simon• The Greatest American Hero• Whiz Kids• Automan• Knight Rider• Riptide• Airwolf• Blue Thunder• The Paper Chase• V: The Series• Max Headroom: UK Pilot

• Stingray (NBC)• MacGyver• Max Headroom• Inspector Morse• The Powers That Be• Ghostwriter• SeaQuest DSV• Weird Science• The X-Files• VR.5• Nowhere Man• Profiler• Team Knight Rider• La Femme Nikita• Buffy the Vampire Slayer• Millennium• Diagnosis Murder• The Net• First Wave• Total Recall 2070

• Walker, Texas Ranger• Level 9• Dark Angel• The Outer Limits• The Lone Gunmen• Alias• Smallville• Spooks• Birds of Prey• Jake 2.0• 24• Battlestar Galactica• JAG• NCIS• Veronica Mars• Hustle• CSI: NY• Criminal Minds• Torchwood• Global Frequency

• Heroes• Eureka (A Town Called Eureka)• Halfway Home• The Kill Point• The Bionic Woman• Chuck• Terminator• Knight Rider• Lewis• Moonlight• Numb3rs• Leverage• Sons of Anarchy• Warehouse 13• NCIS: Los Angeles• The Mentalist• Going Postal• Strike Back• Nikita• Criminal Minds: Suspect Behavior

Page 39: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

When was the first hacker on TV?

1950s1960s1970s1980s1990s2000s

Page 40: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Would you believe?

1950s1960s1970s1980s1990s2000s

Page 41: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

I thought it was...

1950s1960s1970s1980s1990s2000s

Page 42: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Sweeney

• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)

Page 43: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

1960s

Page 44: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 45: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Avengers

• Year: 1962 • Episode: The Big Thinker • Character: Dr. Farrow

Page 46: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Doctor Who

• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor

Page 47: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Star Trek

• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk

Page 48: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Man from U.N.C.L.E

• Years: 1966• Episode: The Off-Broadway Affair • Character: David X. Machina

Page 49: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)

Page 50: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Dragnet 1969

• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and

Peggy Sue Thompson

Page 51: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

1970s

Page 52: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 53: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The Sweeney

• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)

Page 54: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Wonder Woman

• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)

Page 55: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Blake’s 7

• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon

Page 56: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

1980s

Page 57: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 58: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Whiz Kids

• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,

Hamilton Parker and Jeremy Saldino

Page 59: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Whiz Kids

• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,

Hamilton Parker and Jeremy Saldino

Page 60: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 61: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 62: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 63: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

1990s

Page 64: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 65: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The X-Files

Page 66: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The X-Files

Page 67: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The X-Files

Page 68: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The X-Files

Page 69: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

The X-Files“CYBERSPACE”

Page 70: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Page 71: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Page 72: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Page 73: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Page 74: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

2000s

Page 75: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 76: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 77: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Remakes

Page 78: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Based on comics

Page 79: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Sequels

Page 80: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Comparing the television to real life

Page 81: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

In real life…Average age of a hacker?

0-25 years old25-50 years old50-75 years old

Page 82: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

In real life…Average age of a hacker!

0-25 years old25-50 years old50-75 years old

Page 83: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

On television…Age of Hackers

Page 84: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

In real life…Occupations of hackers

• Mostly IT industry, with a

few full-time hackers.

Page 85: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

On television… Occupation of hackers

Page 86: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

In real life…Insider versus outsider attacks

• Might be 50/50, • might be anything

Page 87: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

On television…

Page 88: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hacking on Television

HACKING FEATURED

• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software

Page 89: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Hacking on Television

HACKING FEATURED

• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software

HACKING NOT FEATURED

• DoS Attacks• Phishing• Organisation ID Theft• eHarassment of employees

Page 90: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

But…

• “teenagers sitting in their bedrooms ”

• “often high school or university students ”

Page 91: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Conclusion

OK so what does that tell us

• Is it us or them?

• We need to make it clearer

Page 92: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 93: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 94: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

???

Questions

???

Page 95: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Page 96: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis