SlideShare a Scribd company logo
1 of 4
Download to read offline
Virtual Plug Script
0.00-0.45 Reconstruction
VISUAL AUDIO
MCU of Presenter talking to the camera
RESHOOT – FRIDAY 22/01
JARRETT MILLEN (SYNC)/MUSIC IN - TBD
“Two factor authentication is used to make your
computer more safe and secure.
There are three types of authentication. First, by
something you know e.g. password. Second,
something you possess e.g. ID cards and third,
something you are e.g. biometric. For your
security you should have two of these, which is
essentially what two factor authentication is.
This has also been called as two – step
verification or two factor security. For example if
you want to get money out of a cash machine
you firstly need to present something you own
(your bank card) and then you need something
you know the four digit password.
Websites more often than not only require to
have one of these means of authentication
usually passwords and usernames which is a
problem because some people use weak
passwords, making them an easier target for
hackers to access their account.”
(Presenter 7/Presenter Voice 1.MOV)
JARRETT MILLEN (OOV)
“Now many websites such as Facebook and
Google encourage you to have two factor
authentication by having a phone based
solution, meaning that along with having to enter
your username and password as usual you now
have a text delivered to your phone which
presents to you an authorization code, which
means that hackers now have to have your
phone and your password to get into your
account, meaning that now you have two factor
authentication.”
(Presenter Voice 2.MOV)
CU of Facebook Security Panel (Reconstruction
4.MOV)
CU of Facebook Security Settings
(Reconstruction 3.MOV)
CU of Facebook Login Approval (Reconstruction
4.MOV)
MCU of Phone on bed (Reconstruction 6.MOV) /
MCU of Phone in hand (Reconstruction 7.MOV)
CU of typing (Reconstruction 10/11.MOV)
MCU of Security Code typing (Reconstruction
8.MOV)
ECU of Password entry (Reconstruction 9.MOV)
0.45-1.45 Royal Holloway Interview
VISUAL AUDIO
CU of Royal Holloway sign (Royal Holloway
15.MOV)
MUSIC IN - TBD
MLS of Jarrett entering Royal Holloway gates
(Royal Holloway 5.MOV)
Tilt of Jarrett walking towards Royal Holloway
building (Royal Holloway 8.MOV)
LS of Royal Holloway in the distance (Royal
Holloway 3.MOV)
PROFESSOR KEITH MARTIN (OOV)
“I’m Professor Keith Martin and I’m a Professor
of Information Security at Royal Holloway,
University of London.”
MCU of Professor Keith talking, CU cut-away of
Professor Keith’s hands, various cutaways of
Server Room TBD
PROFESSOR KEITH MARTIN (SYNC/OOV)
“Anything you say or any information you put
into these could at some point in the future get
out out there and be discovered so you have to
be very very cautious about what information
you are putting on there about yourself.
All organizations are prone to problems at the
moment and all individuals as well so as
individuals we have to be very careful. I think if
you ask your friends or speak to colleagues you
will discover someone very quickly who has had
some difficulties of this type so I think it is very
prevalent.
I don’t think you can ever get on top of that
game at all because I think crime will always be
around in any society. We are human beings
and cyberspace is just a new place where
people can conduct crimes…
Wherever there are human beings there will
always be crime and unfortunately that’s the
world we live in. We make it, we are it.”
1.45-2.00 Timelapse
VISUAL AUDIO
Timelapse of the street (Timelapse.MOV) MUSIC IN – TBD
NARRATION - TBD
2.00-2.10 Titles
VISUAL AUDIO
Titles (“Virtual Plug” written in Terminal, with a
slight zoom in) – to be filmed
Typing – audio taken from Reconstruction
10/11.MOV?
2.10-3.30 Hannah Smith Case Study
VISUAL AUDIO
RESHOOT – MONDAY 25/01 JARRETT MILLEN (SYNC)/MUSIC IN (TBD)
“Cyber-crime may involve passwords, firewalls
and IP addresses, but the consequences are felt
far outside the virtual world: real people are
affected just the same. Hacking can lead to the
same anxiety as mugging, while cases such as
Hannah Smith’s are just as devastating.
Hannah Smith was 14 years old when she
died, the verdict: suicide. The coroner described
her as ‘intelligent, bright, clever and bubbly’, but
her family believe she was bullied at school.
Things then became far more dire for the young
girl as bullies targeted her on social networking
site ask,fm, which was largely blamed for driving
her to commit suicide.
Ask.fm allows completely anonymous
messages to be sent in the form of questions;
this enables bullies to torment their victims with
little risk of consequences, meaning that they
are far more likely to do so. In fact, Hannah’s
school had alerted parents to the risks
associated with the website, but Hannah
ignored such warnings. She kept her usage of
the website hidden from her parents while her
sister, Jo, stopped using the website just
months before Hannah’s death.
Despite later reports that the majority of the
messages were sent by Hannah herself, it is still
believed that usage of ask.fm played a role in
her untimely death; her father has called for
legal changes to ensure that vulnerable youths
are protected, and that Hannah’s death was not
in vain.”
3.30-4.45 Miss Wright CEOP Interview
VISUAL AUDIO
MCU of Tina Wright interview, Pan cutaway of
Cullum Centre (MVI_8004.MOV) – possible
cutaways of playground footage if not used –
MCU of raindrops in puddle (Playground
11.MOV)
MCU of swing swinging (Playground 6.MOV)
MISS TINA WRIGHT(SYNC/OOV)
“I’m Tina Wright and I’m a CEOP ambassador.
CEOP is child exploitation and online protection.
What it actually does is try to keep young people
safe on the internet and give parents’ guidance.
I thinks it’s like anything else to be honest, if
it’s used wisely; parents need to take
responsibility for what children and young
people are doing.
The more we talk about it, I think the better
prepared young people are to know the
dangers.
I don’t think that bullying online is any different
to being bullied on the yard, on the playground
or in the workplace.
It all needs to be reported because [while
there’s] lots of reporting buttons on websites, I
wonder how many people feel confident to use
them.”

More Related Content

Viewers also liked

SARATHI BANERJEE 11 year exp C.V
SARATHI BANERJEE 11 year exp  C.VSARATHI BANERJEE 11 year exp  C.V
SARATHI BANERJEE 11 year exp C.VSARATHI BANERJEE
 
Presupuesto y plan de compras iufront
Presupuesto y plan de compras iufrontPresupuesto y plan de compras iufront
Presupuesto y plan de compras iufrontKarime de Pedraza
 
портфоліо
портфоліо портфоліо
портфоліо 5
 
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIO
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIOINTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIO
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIOProfessorPrincipiante
 
Østlandssamarbeidet 5 mai 2010
Østlandssamarbeidet 5  mai 2010Østlandssamarbeidet 5  mai 2010
Østlandssamarbeidet 5 mai 2010kirsle
 
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015 n6 art 4
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015   n6 art 4LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015   n6 art 4
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015 n6 art 4Dario Vinci
 
The fetters and the freedom dr. shriniwas kashalikar
The fetters and the freedom dr. shriniwas kashalikarThe fetters and the freedom dr. shriniwas kashalikar
The fetters and the freedom dr. shriniwas kashalikarbanothkishan
 

Viewers also liked (12)

SARATHI BANERJEE 11 year exp C.V
SARATHI BANERJEE 11 year exp  C.VSARATHI BANERJEE 11 year exp  C.V
SARATHI BANERJEE 11 year exp C.V
 
Presupuesto y plan de compras iufront
Presupuesto y plan de compras iufrontPresupuesto y plan de compras iufront
Presupuesto y plan de compras iufront
 
Je0514044 eln 002
Je0514044 eln 002Je0514044 eln 002
Je0514044 eln 002
 
Guía sofía
Guía sofíaGuía sofía
Guía sofía
 
портфоліо
портфоліо портфоліо
портфоліо
 
A4 Strategies for Internationalizing your College or University (Heisel)
A4 Strategies for Internationalizing your College or University  (Heisel)A4 Strategies for Internationalizing your College or University  (Heisel)
A4 Strategies for Internationalizing your College or University (Heisel)
 
Watson how it works?
Watson how it works?Watson how it works?
Watson how it works?
 
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIO
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIOINTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIO
INTERDISCIPLINARIDADE NO TRABALHO DOCENTE DO PROFESSOR DE ENSINO MÉDIO
 
Fundamentos contables
Fundamentos contablesFundamentos contables
Fundamentos contables
 
Østlandssamarbeidet 5 mai 2010
Østlandssamarbeidet 5  mai 2010Østlandssamarbeidet 5  mai 2010
Østlandssamarbeidet 5 mai 2010
 
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015 n6 art 4
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015   n6 art 4LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015   n6 art 4
LA NUOVA PROCEDURA DI CONVALIDA DELLE DIMISSIONI: Agidae 2015 n6 art 4
 
The fetters and the freedom dr. shriniwas kashalikar
The fetters and the freedom dr. shriniwas kashalikarThe fetters and the freedom dr. shriniwas kashalikar
The fetters and the freedom dr. shriniwas kashalikar
 

Similar to Virtual Plug Script NEW

Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentationworldgala
 
Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentationworldgala
 
Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentationworldgala
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
BSidesHSV 2020 - Keynote - 2030: The Next Decade
BSidesHSV 2020 - Keynote - 2030: The Next DecadeBSidesHSV 2020 - Keynote - 2030: The Next Decade
BSidesHSV 2020 - Keynote - 2030: The Next DecadeChris Sistrunk
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)Felipe Prado
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 

Similar to Virtual Plug Script NEW (20)

Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
 
Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentation
 
Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentation
 
Intermedia Presentation
Intermedia PresentationIntermedia Presentation
Intermedia Presentation
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
Reflection
ReflectionReflection
Reflection
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
BSidesHSV 2020 - Keynote - 2030: The Next Decade
BSidesHSV 2020 - Keynote - 2030: The Next DecadeBSidesHSV 2020 - Keynote - 2030: The Next Decade
BSidesHSV 2020 - Keynote - 2030: The Next Decade
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 

More from salesian2016a2

Alternative Advert Plan
Alternative Advert PlanAlternative Advert Plan
Alternative Advert Plansalesian2016a2
 
Double Page Spread Plan
Double Page Spread PlanDouble Page Spread Plan
Double Page Spread Plansalesian2016a2
 
Double Page Spread Research 2
Double Page Spread Research 2Double Page Spread Research 2
Double Page Spread Research 2salesian2016a2
 
Double Page Spread Research
Double Page Spread ResearchDouble Page Spread Research
Double Page Spread Researchsalesian2016a2
 
Question 3 - Media Evaluation
Question 3 - Media Evaluation Question 3 - Media Evaluation
Question 3 - Media Evaluation salesian2016a2
 
Steven Mcloughlin Virtual Plug Newspaper Advert
Steven Mcloughlin Virtual Plug Newspaper AdvertSteven Mcloughlin Virtual Plug Newspaper Advert
Steven Mcloughlin Virtual Plug Newspaper Advertsalesian2016a2
 
Channel 4 Branding Test
Channel 4 Branding TestChannel 4 Branding Test
Channel 4 Branding Testsalesian2016a2
 

More from salesian2016a2 (13)

Alternative Advert Plan
Alternative Advert PlanAlternative Advert Plan
Alternative Advert Plan
 
Advert Plan
Advert PlanAdvert Plan
Advert Plan
 
Double Page Spread Plan
Double Page Spread PlanDouble Page Spread Plan
Double Page Spread Plan
 
Double Page Spread Research 2
Double Page Spread Research 2Double Page Spread Research 2
Double Page Spread Research 2
 
Double Page Spread Research
Double Page Spread ResearchDouble Page Spread Research
Double Page Spread Research
 
Question 3 - Media Evaluation
Question 3 - Media Evaluation Question 3 - Media Evaluation
Question 3 - Media Evaluation
 
Steven Mcloughlin Virtual Plug Newspaper Advert
Steven Mcloughlin Virtual Plug Newspaper AdvertSteven Mcloughlin Virtual Plug Newspaper Advert
Steven Mcloughlin Virtual Plug Newspaper Advert
 
Virtual Plug Script
Virtual Plug ScriptVirtual Plug Script
Virtual Plug Script
 
Calendar for Filming
Calendar for FilmingCalendar for Filming
Calendar for Filming
 
Channel 4 Branding Test
Channel 4 Branding TestChannel 4 Branding Test
Channel 4 Branding Test
 
Virtual Plug Script
Virtual Plug ScriptVirtual Plug Script
Virtual Plug Script
 
Prof transcript
Prof transcriptProf transcript
Prof transcript
 
Pitch
Pitch Pitch
Pitch
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Virtual Plug Script NEW

  • 1. Virtual Plug Script 0.00-0.45 Reconstruction VISUAL AUDIO MCU of Presenter talking to the camera RESHOOT – FRIDAY 22/01 JARRETT MILLEN (SYNC)/MUSIC IN - TBD “Two factor authentication is used to make your computer more safe and secure. There are three types of authentication. First, by something you know e.g. password. Second, something you possess e.g. ID cards and third, something you are e.g. biometric. For your security you should have two of these, which is essentially what two factor authentication is. This has also been called as two – step verification or two factor security. For example if you want to get money out of a cash machine you firstly need to present something you own (your bank card) and then you need something you know the four digit password. Websites more often than not only require to have one of these means of authentication usually passwords and usernames which is a problem because some people use weak passwords, making them an easier target for hackers to access their account.” (Presenter 7/Presenter Voice 1.MOV) JARRETT MILLEN (OOV) “Now many websites such as Facebook and Google encourage you to have two factor authentication by having a phone based solution, meaning that along with having to enter your username and password as usual you now have a text delivered to your phone which presents to you an authorization code, which means that hackers now have to have your phone and your password to get into your account, meaning that now you have two factor authentication.” (Presenter Voice 2.MOV) CU of Facebook Security Panel (Reconstruction 4.MOV) CU of Facebook Security Settings (Reconstruction 3.MOV) CU of Facebook Login Approval (Reconstruction 4.MOV) MCU of Phone on bed (Reconstruction 6.MOV) / MCU of Phone in hand (Reconstruction 7.MOV) CU of typing (Reconstruction 10/11.MOV) MCU of Security Code typing (Reconstruction 8.MOV) ECU of Password entry (Reconstruction 9.MOV)
  • 2. 0.45-1.45 Royal Holloway Interview VISUAL AUDIO CU of Royal Holloway sign (Royal Holloway 15.MOV) MUSIC IN - TBD MLS of Jarrett entering Royal Holloway gates (Royal Holloway 5.MOV) Tilt of Jarrett walking towards Royal Holloway building (Royal Holloway 8.MOV) LS of Royal Holloway in the distance (Royal Holloway 3.MOV) PROFESSOR KEITH MARTIN (OOV) “I’m Professor Keith Martin and I’m a Professor of Information Security at Royal Holloway, University of London.” MCU of Professor Keith talking, CU cut-away of Professor Keith’s hands, various cutaways of Server Room TBD PROFESSOR KEITH MARTIN (SYNC/OOV) “Anything you say or any information you put into these could at some point in the future get out out there and be discovered so you have to be very very cautious about what information you are putting on there about yourself. All organizations are prone to problems at the moment and all individuals as well so as individuals we have to be very careful. I think if you ask your friends or speak to colleagues you will discover someone very quickly who has had some difficulties of this type so I think it is very prevalent. I don’t think you can ever get on top of that game at all because I think crime will always be around in any society. We are human beings and cyberspace is just a new place where people can conduct crimes… Wherever there are human beings there will always be crime and unfortunately that’s the world we live in. We make it, we are it.” 1.45-2.00 Timelapse VISUAL AUDIO Timelapse of the street (Timelapse.MOV) MUSIC IN – TBD NARRATION - TBD 2.00-2.10 Titles VISUAL AUDIO Titles (“Virtual Plug” written in Terminal, with a slight zoom in) – to be filmed Typing – audio taken from Reconstruction 10/11.MOV?
  • 3. 2.10-3.30 Hannah Smith Case Study VISUAL AUDIO RESHOOT – MONDAY 25/01 JARRETT MILLEN (SYNC)/MUSIC IN (TBD) “Cyber-crime may involve passwords, firewalls and IP addresses, but the consequences are felt far outside the virtual world: real people are affected just the same. Hacking can lead to the same anxiety as mugging, while cases such as Hannah Smith’s are just as devastating. Hannah Smith was 14 years old when she died, the verdict: suicide. The coroner described her as ‘intelligent, bright, clever and bubbly’, but her family believe she was bullied at school. Things then became far more dire for the young girl as bullies targeted her on social networking site ask,fm, which was largely blamed for driving her to commit suicide. Ask.fm allows completely anonymous messages to be sent in the form of questions; this enables bullies to torment their victims with little risk of consequences, meaning that they are far more likely to do so. In fact, Hannah’s school had alerted parents to the risks associated with the website, but Hannah ignored such warnings. She kept her usage of the website hidden from her parents while her sister, Jo, stopped using the website just months before Hannah’s death. Despite later reports that the majority of the messages were sent by Hannah herself, it is still believed that usage of ask.fm played a role in her untimely death; her father has called for legal changes to ensure that vulnerable youths are protected, and that Hannah’s death was not in vain.”
  • 4. 3.30-4.45 Miss Wright CEOP Interview VISUAL AUDIO MCU of Tina Wright interview, Pan cutaway of Cullum Centre (MVI_8004.MOV) – possible cutaways of playground footage if not used – MCU of raindrops in puddle (Playground 11.MOV) MCU of swing swinging (Playground 6.MOV) MISS TINA WRIGHT(SYNC/OOV) “I’m Tina Wright and I’m a CEOP ambassador. CEOP is child exploitation and online protection. What it actually does is try to keep young people safe on the internet and give parents’ guidance. I thinks it’s like anything else to be honest, if it’s used wisely; parents need to take responsibility for what children and young people are doing. The more we talk about it, I think the better prepared young people are to know the dangers. I don’t think that bullying online is any different to being bullied on the yard, on the playground or in the workplace. It all needs to be reported because [while there’s] lots of reporting buttons on websites, I wonder how many people feel confident to use them.”