Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

Preview:

DESCRIPTION

 

Citation preview

Hackers and Hollywood 2:Considering Televisual Cyberthreats

In Security Risk Analysis

THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR

APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.

THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR

APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.

www.filmratings.com www.mpaa.comwww.filmratings.com www.mpaa.com

ComingSoon

to a computer near you

The Dublin Institute of Technology proudly presents…

Damian Gordon

production

a

Hackers and HollywoodConsidering Televisual Cyberthreats

In Security Risk Analysis

Hackers and HollywoodConsidering Televisual Cyberthreats

In Security Risk Analysis

But first, a story

Years and years ago…

Years and years ago…

UNNAMED ORGANISATION

Years and years ago…

me

My boss

My boss’s boss

Owner

Years and years ago…

me

My boss

My boss’s boss

Owner

Years and years ago…

me

My boss

My boss’s boss

Owner

First task…

Create security policies for 14 companies

= bewilderment

Security Policy

Security Policy

Risk Analysis

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

Hackers on Television

The work

• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.

“I’ll create a GUI interface using Visual

Basic…see if I can track an IP address.”

Hacker vs Hacker

Data Collection

Hermeneutic Phenomenology

Six Principles

The show must feature a hacker in it, and the hacker must be well-developed character

I

Once a hacker character has been shown to hack a few times, they don’t

have to hack in each episode to be still

considered a hacker.

II

No animated television shows will be considered.

III

If a show introduces a hacker group, all the

members are counted, even if only some of

them are shown hacking.

IV

When a hacker appears on a different TV show, they don’t need to be

shown to be hacking in the new show for it to

count.

V

No hacker documentaries will

be considered, only television

shows.

VI

Resulting in…

80 Television Shows• The Avengers• Doctor Who• Star Trek• The Man from U.N.C.L.E• The Prisoner• Dragnet 1969• The Sweeney • Wonder Woman• Blake's 7• Simon & Simon• The Greatest American Hero• Whiz Kids• Automan• Knight Rider• Riptide• Airwolf• Blue Thunder• The Paper Chase• V: The Series• Max Headroom: UK Pilot

• Stingray (NBC)• MacGyver• Max Headroom• Inspector Morse• The Powers That Be• Ghostwriter• SeaQuest DSV• Weird Science• The X-Files• VR.5• Nowhere Man• Profiler• Team Knight Rider• La Femme Nikita• Buffy the Vampire Slayer• Millennium• Diagnosis Murder• The Net• First Wave• Total Recall 2070

• Walker, Texas Ranger• Level 9• Dark Angel• The Outer Limits• The Lone Gunmen• Alias• Smallville• Spooks• Birds of Prey• Jake 2.0• 24• Battlestar Galactica• JAG• NCIS• Veronica Mars• Hustle• CSI: NY• Criminal Minds• Torchwood• Global Frequency

• Heroes• Eureka (A Town Called Eureka)• Halfway Home• The Kill Point• The Bionic Woman• Chuck• Terminator• Knight Rider• Lewis• Moonlight• Numb3rs• Leverage• Sons of Anarchy• Warehouse 13• NCIS: Los Angeles• The Mentalist• Going Postal• Strike Back• Nikita• Criminal Minds: Suspect Behavior

When was the first hacker on TV?

1950s1960s1970s1980s1990s2000s

Would you believe?

1950s1960s1970s1980s1990s2000s

I thought it was...

1950s1960s1970s1980s1990s2000s

The Sweeney

• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)

1960s

The Avengers

• Year: 1962 • Episode: The Big Thinker • Character: Dr. Farrow

Doctor Who

• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor

Star Trek

• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk

The Man from U.N.C.L.E

• Years: 1966• Episode: The Off-Broadway Affair • Character: David X. Machina

The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)

Dragnet 1969

• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and

Peggy Sue Thompson

1970s

The Sweeney

• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)

Wonder Woman

• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)

Blake’s 7

• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon

1980s

Whiz Kids

• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,

Hamilton Parker and Jeremy Saldino

Whiz Kids

• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,

Hamilton Parker and Jeremy Saldino

1990s

The X-Files

The X-Files

The X-Files

The X-Files

The X-Files“CYBERSPACE”

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

Diagnosis: Murder

• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd

Harcourt, Tapley and J.W.

2000s

Remakes

Based on comics

Sequels

Comparing the television to real life

In real life…Average age of a hacker?

0-25 years old25-50 years old50-75 years old

In real life…Average age of a hacker!

0-25 years old25-50 years old50-75 years old

On television…Age of Hackers

In real life…Occupations of hackers

• Mostly IT industry, with a

few full-time hackers.

On television… Occupation of hackers

In real life…Insider versus outsider attacks

• Might be 50/50, • might be anything

On television…

Hacking on Television

HACKING FEATURED

• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software

Hacking on Television

HACKING FEATURED

• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software

HACKING NOT FEATURED

• DoS Attacks• Phishing• Organisation ID Theft• eHarassment of employees

But…

• “teenagers sitting in their bedrooms ”

• “often high school or university students ”

Conclusion

OK so what does that tell us

• Is it us or them?

• We need to make it clearer

???

Questions

???

Recommended