Your SlideShare is downloading. ×
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Cyber Security At The Cinema
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber Security At The Cinema

422

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
422
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • This powerpoint is part of our Information Security Awareness series for the Information Solutions Netwok (ISN)
  • Based on Information security Policy: Rules that govern the use of Information Systems: Classification in increasing order: public, private, confidential, company secret Access controls: passwords, tokens, back doors, biometrics Information classification Public, private, confidential, company secret
  • Nigerian scam Hacking
  • Ask audience to understand their ideas on this…
  • http://www.imdb.com/title/tt0086567/
  • David & Jennifer David shows Jen he change his (and hers) grades by hacking into the school’s server.
  • David wants to connect to game company using war dialer. Here he’s entering the area code suffix start end points.
  • Once he finds the “game” company he starts playing a game from the menu: Thermonuclear war, not knowing….
  • That is not a game, but he patched into the back door of a secure system that runs the NORAD nuclear weapons system
  • At the end of the movie, while the NORAD computer is about to start the 3 rd World War, David tricks the computer learning system to play tic-tac-to, eventually realizing nobody wins…
  • Then, having learned that, it starts estimating potential launch points and counterpoints for nuclear attack, And just line in tic-tac-to, …
  • Nobody wins
  • http://www.imdb.com/title/tt0113957/
  • Angela receives a strange disk from a client with a secret back door
  • Here she tricks her pursuers by thinking she’s going to send the evidence…
  • Then she plants a keylogger in her corporate computer, Later she infects the Pretorians (her enemy) mainframe program with a virus.
  • http://www.imdb.com/title/tt0113243/
  • Dade & Kate realize they are both hackers fighting a common enemy
  • While attacking the mainframe of EMC
  • http://www.imdb.com/title/tt0133093/ http://www.imdb.com/title/tt0234215/ http://www.imdb.com/title/tt0242653/
  • In the first movie, Neo gets hacked by Trinity and she types “Wake up Neo” at minute 7:16, then “Follow the white rabbit” so she can meet him later.
  • At 30:40 monitoring the Matrix code.
  • At 2:05:30 Neo realizes he’s the One, and can see the Matrix for what it really is: 0 & 1s!
  • On the second movie 1:47:40 to 1:48:25 also The movie clip [matrix-hack.mov] available at http://images.insecure.org/nmap/images/matrix/
  • Here’s the nmap + ssh exploit
  • http://www.imdb.com/title/tt0105435/
  • http://www.imdb.com/title/tt0084827/
  • Alan (Tron) and Lora (both computer software engineers) & Dr. Walter Gibbs meet at the plant while our out of work hacker Kevin tries to get in…
  • But the computer fights back and digitizes him, placing him inside like another software program
  • Where he has to fight back all the way to freedom
  • Playing mortal freesbee games, gladiator style
  • All to get access to the copyright notice claiming that he was the real author of the space paranoids game that make the company rich instead of the evil Master Control Program---Ed Dillinger.
  • http://www.imdb.com/title/tt0244244/
  • http://www.imdb.com/title/tt0159784/
  • Transcript

    • 1. Cyber Security at the Cinema by Adrian Mikeliunas, CISSP, CLP [email_address]
    • 2. Agenda
      • Movie Selection Criteria
      • Overview of Cyber Security
      • Top 7 Movie List
      • Honorary Mentions
      • Conclusion
    • 3. Movies
      • Movies provide
        • Entertainment
        • Education
      • Many movies show how to:
        • Break computer security,
        • Hack, cheat, steal…
      •  Helps us get more prepared
      •  Work becomes more challenging
    • 4. Selection Criteria
      • Hacker has to be one of the main characters or movie ideas
      • A Hacker is one who:
        • is proficient at using or programming a computer; a computer buff.
        • uses programming skills to gain illegal access to a computer network or file
      • Two or more cyber security events in the movie (hacking, cracking, …)
    • 5. Cyber Security Events
      • Bypass Access controls
          • ID, Passwords, back doors, Biometrics
      • Bypass Physical Security
          • Personnel, Storage, Encryption
      • Tamper Communications
          • Electronic commerce, Mail, Documents
      • Tamper Systems Development
          • Change controls, malware protection, crypto
    • 6. What is Cyber Security?
      • Computer Security [ TECHNOLOGY ]
        • Access & Passwords
        • Hacking / Cracking
        • Viruses, Worms, & Trojans
      • Social Engineering [ HUMAN ]
        • Personal Information
        • Medical Records
        • Personnel & Financial data
        • Spam, Scams & Phishing http://www.antiphishing.org
    • 7. Weakest Security Link
      • Human Element?
      • Computer Element?
      • Both?
    • 8. Top Cyber Security Movies
      • War Games
      • Hackers
      • The Net
      • Matrix Trilogy
      • Sneakers
      • Tron
    • 9. War Games-1983
        • A young man finds a back door into a military central computer in which reality is confused with game-playing, possibly starting World War III
      • The main debate is: should humans be in charge of launching a nuclear strike or should a (fail safe) computer decide?
      • Simple special effects, but realistic for that time. Movie grossed $75M.
    • 10. War Games-(2)
        • War Dialing: kids wants to connect to game company
        • Back Door: modem access was for developer
        • Easy to guess Password: Joshua
        • Denial of Service: play tic-tac-toe to prove that in a nuclear war nobody wins!
    • 11.  
    • 12.  
    • 13.  
    • 14.  
    • 15.  
    • 16.  
    • 17.  
    • 18. The Net-1995
      • Angela Bennett is a software engineer working from home in Reston
      • A client sends her a game program with a weird glitch for her to debug. On his way to meet her, he’s killed in a plane crash
      • Angela discovers secret information on the disk she has received only hours before she leaves for vacation.
      • Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record.
    • 19. The Net (2)
      • Identity Theft has become #1 crime in the world
      • Many commercial programs contain Easter Eggs (or backdoors) http://www.eeggs.com
      • Angela uses a keylogger & virus at the end to payback her attackers
    • 20.  
    • 21.  
    • 22.  
    • 23. Hackers-1995
      • A young boy is arrested by the Secret Service for writing a virus, and banned from using a computer until his 18th birthday.
      • Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
      • Unreal special “hacking” effects!
    • 24. Hackers (2)
      • Remote take over of other computer systems
        • TV Station
        • School fire alarm system
        • Corporate Mainframe
      • Hacking in many instances
    • 25.  
    • 26.  
    • 27.  
    • 28. Matrix-1999
      • A group of rebels free Neo, a computer hacker, in hope that he can stop the Matrix, a computer system that slaves mankind.
      • In the second movie, Trinity uses a special hacking tool: nmap
      • Great Sci-Fi trilogy, many special effects
    • 29. Matrix (2)
      • Neo is a hacker who gets hacked by Trinity in order to communicate inside the Matrix
      • Trinity shuts down the power plant grid by exploiting an SSH vulnerability
      • He goes back in to fight the agents and the Matrix, going out via a regular phone line…
    • 30.  
    • 31.  
    • 32.  
    • 33.  
    • 34.  
    • 35. Sneakers-1993
      • Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.
      • They recover a box that has the capability to decode all existing encryption systems around the world
    • 36.  
    • 37. TRON-1982
      • A hacker is literally abducted into the world of a computer and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program.
      • TRON (trace on) defeats the MCP (master control program) so his user can retrieve the stolen video game copyrights he owned.
    • 38.  
    • 39.  
    • 40.  
    • 41.  
    • 42.  
    • 43. Honorable Mentions
      • Swordfish
      • The Italian Job
      • Catch me if you can
      • Take Down
      • Independence Day
      • Gathaka
      • Charlie’s Angels
    • 44. Swordfish-2001
      • The D.E.A. shut down its dummy corporation operation codenamed SWORDFISH in 1986, with $400M…
      • The world's most dangerous spy is hired by the CIA to coerce a computer hacker recently released from prison to help steal billions in unused government funds, but it's all locked away behind super-encryption.
    • 45. Takedown-2000
      • Kevin Mitnick is quite possibly the most well known hacker in the world
      • Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges
      • When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
    • 46. Conclusion
      • Cyber Security is always under attack, prevention can help
      • Protect your password
      • Protect your company information assets & your personal information
      • Get informed & Get Involved!
        • New Information Security Policy http://infosec
        • New Information Security Training http://ISO17799

    ×