Hackers and Hollywood 2:Considering Televisual Cyber threats     In Security Risk A nalysis
THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR  THE FOLLOWING         HAS BEEN APPROVED FOR           APPROPRIATE AUDIENCES  ...
Coming Soon
to acomputer near you
The Dublin Institute ofTechnology proudly presents…
aDamianGordon         production
Hacker s and HollywoodConsidering Televisual Cyber threats     In Security Risk A nalysis
Hacker s and HollywoodConsidering Televisual Cyber threats     In Security Risk A nalysis
But first, a story
Years and years ago…
Years and years ago…   UNNAMED ORGANISATION
Years and years ago… OwnerMy boss’s  boss My boss   me
Years and years ago… OwnerMy boss’s  boss My boss   me
Years and years ago… OwnerMy boss’s  boss My boss   me
First task…Create security policies   for 14 companies
= bewilderment
Security Policy    Risk Analysis    Security Policy
How do you identify threats?“…experience and imagination…”       - Pfleeger and Pfleeger
How do you identify threats?“…experience and imagination…”       - Pfleeger and Pfleeger
Hackers on Television
The work• This research set out to  identify whether or not  television is accurately  portraying hackers, and the  implic...
“I’ll create a GUI interface using VisualBasic…see if I can track     an IP address.”
Hacker vs Hacker
Data Collection
Hermeneutic Phenomenology
Six Principles
IThe show must featurea hacker in it, and the hacker must be well- developed character
IIOnce a hacker characterhas been shown to hack a few times, they don’t   have to hack in each    episode to be still  con...
IIINo animated television    shows will be     considered.
IV  If a show introduces a   hacker group, all the members are counted,   even if only some ofthem are shown hacking.
VWhen a hacker appearson a different TV show, they don’t need to beshown to be hacking in the new show for it to          ...
VI    No hackerdocumentaries will be considered,  only television      shows.
Resulting in…
80 Television Shows•   The Avengers            •    Stingray (NBC)          •   Walker, Texas Ranger   •   Heroes•   Docto...
When was the first hacker on TV?   1950s   1960s   1970s   1980s   1990s   2000s
Would you believe?1950s1960s1970s1980s1990s2000s
I thought it was...1950s1960s1970s1980s1990s2000s
The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
1960s
The Avengers• Year: 1962• Episode: The Big Thinker• Character: Dr. Farrow
Doctor Who• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor
Star Trek• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk
The Man from U.N.C.L.E• Years: 1966• Episode: The Off-Broadway Affair• Character: David X. Machina
The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)
Dragnet 1969• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and  Peggy Sue Thompson
1970s
The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
Wonder Woman• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)
Blake’s 7• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon
1980s
Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,  Hamilton Parker and Jeremy Sal...
Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,  Hamilton Parker and Jeremy Sal...
1990s
The X-Files
The X-Files
The X-Files
The X-Files
The X-Files        “CYBERSPACE”
Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd  Harcourt, Tapley and J.W.
Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd  Harcourt, Tapley and J.W.
Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd  Harcourt, Tapley and J.W.
Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd  Harcourt, Tapley and J.W.
2000s
Remakes
Based on comics
Sequels
Comparing thetelevision to real life
In real life…    Average age of a hacker? 0-25 years old25-50 years old50-75 years old
In real life…    Average age of a hacker! 0-25 years old25-50 years old50-75 years old
On television…Age of Hackers
In real life…     Occupations of hackers• Mostly IT industry, with a  few full-time hackers.
On television…Occupation of hackers
In real life… Insider versus outsider attacks• Might be 50/50,• might be anything 
On television…
Hacking on TelevisionHACKING FEATURED•   Salami Slicing Attack•   Social Engineering•   Hacking Software•   Insider Attack...
Hacking on TelevisionHACKING FEATURED            HACKING NOT FEATURED•   Salami Slicing Attack   •   DoS Attacks•   Social...
But…• “teenagers sitting in their bedrooms ”• “often high school or university students ”
Conclusion OK so what does that tell us• Is it us or them?• We need to make it clearer
???Questions  ???
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Upcoming SlideShare
Loading in …5
×

Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

1,059 views

Published on

Published in: Entertainment & Humor
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,059
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

  1. 1. Hackers and Hollywood 2:Considering Televisual Cyber threats In Security Risk A nalysis
  2. 2. THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR THE FOLLOWING HAS BEEN APPROVED FOR APPROPRIATE AUDIENCES BY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC. BY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.www.filmratings.com www.filmratings.com www.mpaa.com www.mpaa.com
  3. 3. Coming Soon
  4. 4. to acomputer near you
  5. 5. The Dublin Institute ofTechnology proudly presents…
  6. 6. aDamianGordon production
  7. 7. Hacker s and HollywoodConsidering Televisual Cyber threats In Security Risk A nalysis
  8. 8. Hacker s and HollywoodConsidering Televisual Cyber threats In Security Risk A nalysis
  9. 9. But first, a story
  10. 10. Years and years ago…
  11. 11. Years and years ago… UNNAMED ORGANISATION
  12. 12. Years and years ago… OwnerMy boss’s boss My boss me
  13. 13. Years and years ago… OwnerMy boss’s boss My boss me
  14. 14. Years and years ago… OwnerMy boss’s boss My boss me
  15. 15. First task…Create security policies for 14 companies
  16. 16. = bewilderment
  17. 17. Security Policy Risk Analysis Security Policy
  18. 18. How do you identify threats?“…experience and imagination…” - Pfleeger and Pfleeger
  19. 19. How do you identify threats?“…experience and imagination…” - Pfleeger and Pfleeger
  20. 20. Hackers on Television
  21. 21. The work• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
  22. 22. “I’ll create a GUI interface using VisualBasic…see if I can track an IP address.”
  23. 23. Hacker vs Hacker
  24. 24. Data Collection
  25. 25. Hermeneutic Phenomenology
  26. 26. Six Principles
  27. 27. IThe show must featurea hacker in it, and the hacker must be well- developed character
  28. 28. IIOnce a hacker characterhas been shown to hack a few times, they don’t have to hack in each episode to be still considered a hacker.
  29. 29. IIINo animated television shows will be considered.
  30. 30. IV If a show introduces a hacker group, all the members are counted, even if only some ofthem are shown hacking.
  31. 31. VWhen a hacker appearson a different TV show, they don’t need to beshown to be hacking in the new show for it to count.
  32. 32. VI No hackerdocumentaries will be considered, only television shows.
  33. 33. Resulting in…
  34. 34. 80 Television Shows• The Avengers • Stingray (NBC) • Walker, Texas Ranger • Heroes• Doctor Who • MacGyver • Level 9 • Eureka (A Town Called Eureka)• Star Trek • Max Headroom • Dark Angel • Halfway Home• The Man from U.N.C.L.E • Inspector Morse • The Outer Limits • The Kill Point• The Prisoner • The Powers That Be • The Lone Gunmen • The Bionic Woman• Dragnet 1969 • Ghostwriter • Alias • Chuck• The Sweeney • SeaQuest DSV • Smallville • Terminator• Wonder Woman • Weird Science • Spooks • Knight Rider• Blakes 7 • The X-Files • Birds of Prey • Lewis• Simon & Simon • VR.5 • Jake 2.0 • Moonlight• • The Greatest American Hero Nowhere Man • 24 • Numb3rs• Whiz Kids • Profiler • Battlestar Galactica • Leverage• Automan • Team Knight Rider • JAG • Sons of Anarchy• Knight Rider • La Femme Nikita • NCIS • Warehouse 13• Riptide • Buffy the Vampire Slayer• Veronica Mars • NCIS: Los Angeles• Airwolf • Millennium • Hustle • The Mentalist• Blue Thunder • Diagnosis Murder • CSI: NY • Going Postal• The Paper Chase • The Net • Criminal Minds • Strike Back• V: The Series • First Wave • Torchwood • Nikita• Max Headroom: UK Pilot • Total Recall 2070 • Global Frequency • Criminal Minds: Suspect Behavior
  35. 35. When was the first hacker on TV? 1950s 1960s 1970s 1980s 1990s 2000s
  36. 36. Would you believe?1950s1960s1970s1980s1990s2000s
  37. 37. I thought it was...1950s1960s1970s1980s1990s2000s
  38. 38. The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
  39. 39. 1960s
  40. 40. The Avengers• Year: 1962• Episode: The Big Thinker• Character: Dr. Farrow
  41. 41. Doctor Who• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor
  42. 42. Star Trek• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk
  43. 43. The Man from U.N.C.L.E• Years: 1966• Episode: The Off-Broadway Affair• Character: David X. Machina
  44. 44. The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)
  45. 45. Dragnet 1969• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and Peggy Sue Thompson
  46. 46. 1970s
  47. 47. The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
  48. 48. Wonder Woman• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)
  49. 49. Blake’s 7• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon
  50. 50. 1980s
  51. 51. Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler, Hamilton Parker and Jeremy Saldino
  52. 52. Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler, Hamilton Parker and Jeremy Saldino
  53. 53. 1990s
  54. 54. The X-Files
  55. 55. The X-Files
  56. 56. The X-Files
  57. 57. The X-Files
  58. 58. The X-Files “CYBERSPACE”
  59. 59. Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
  60. 60. Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
  61. 61. Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
  62. 62. Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
  63. 63. 2000s
  64. 64. Remakes
  65. 65. Based on comics
  66. 66. Sequels
  67. 67. Comparing thetelevision to real life
  68. 68. In real life… Average age of a hacker? 0-25 years old25-50 years old50-75 years old
  69. 69. In real life… Average age of a hacker! 0-25 years old25-50 years old50-75 years old
  70. 70. On television…Age of Hackers
  71. 71. In real life… Occupations of hackers• Mostly IT industry, with a few full-time hackers.
  72. 72. On television…Occupation of hackers
  73. 73. In real life… Insider versus outsider attacks• Might be 50/50,• might be anything 
  74. 74. On television…
  75. 75. Hacking on TelevisionHACKING FEATURED• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
  76. 76. Hacking on TelevisionHACKING FEATURED HACKING NOT FEATURED• Salami Slicing Attack • DoS Attacks• Social Engineering • Phishing• Hacking Software • Organisation ID Theft• Insider Attacks • eHarassment of employees• Password Software
  77. 77. But…• “teenagers sitting in their bedrooms ”• “often high school or university students ”
  78. 78. Conclusion OK so what does that tell us• Is it us or them?• We need to make it clearer
  79. 79. ???Questions ???

×