Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
-
date post
21-Oct-2014 -
Category
Entertainment & Humor
-
view
1.008 -
download
1
description
Transcript of Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
Hackers and Hollywood 2:Considering Televisual Cyberthreats
In Security Risk Analysis
THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR
APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.
THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR
APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.
www.filmratings.com www.mpaa.comwww.filmratings.com www.mpaa.com
ComingSoon
to a computer near you
The Dublin Institute of Technology proudly presents…
Damian Gordon
production
a
Hackers and HollywoodConsidering Televisual Cyberthreats
In Security Risk Analysis
Hackers and HollywoodConsidering Televisual Cyberthreats
In Security Risk Analysis
But first, a story
Years and years ago…
Years and years ago…
UNNAMED ORGANISATION
Years and years ago…
me
My boss
My boss’s boss
Owner
Years and years ago…
me
My boss
My boss’s boss
Owner
Years and years ago…
me
My boss
My boss’s boss
Owner
First task…
Create security policies for 14 companies
= bewilderment
Security Policy
Security Policy
Risk Analysis
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
Hackers on Television
The work
• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
“I’ll create a GUI interface using Visual
Basic…see if I can track an IP address.”
Hacker vs Hacker
Data Collection
Hermeneutic Phenomenology
Six Principles
The show must feature a hacker in it, and the hacker must be well-developed character
I
Once a hacker character has been shown to hack a few times, they don’t
have to hack in each episode to be still
considered a hacker.
II
No animated television shows will be considered.
III
If a show introduces a hacker group, all the
members are counted, even if only some of
them are shown hacking.
IV
When a hacker appears on a different TV show, they don’t need to be
shown to be hacking in the new show for it to
count.
V
No hacker documentaries will
be considered, only television
shows.
VI
Resulting in…
80 Television Shows• The Avengers• Doctor Who• Star Trek• The Man from U.N.C.L.E• The Prisoner• Dragnet 1969• The Sweeney • Wonder Woman• Blake's 7• Simon & Simon• The Greatest American Hero• Whiz Kids• Automan• Knight Rider• Riptide• Airwolf• Blue Thunder• The Paper Chase• V: The Series• Max Headroom: UK Pilot
• Stingray (NBC)• MacGyver• Max Headroom• Inspector Morse• The Powers That Be• Ghostwriter• SeaQuest DSV• Weird Science• The X-Files• VR.5• Nowhere Man• Profiler• Team Knight Rider• La Femme Nikita• Buffy the Vampire Slayer• Millennium• Diagnosis Murder• The Net• First Wave• Total Recall 2070
• Walker, Texas Ranger• Level 9• Dark Angel• The Outer Limits• The Lone Gunmen• Alias• Smallville• Spooks• Birds of Prey• Jake 2.0• 24• Battlestar Galactica• JAG• NCIS• Veronica Mars• Hustle• CSI: NY• Criminal Minds• Torchwood• Global Frequency
• Heroes• Eureka (A Town Called Eureka)• Halfway Home• The Kill Point• The Bionic Woman• Chuck• Terminator• Knight Rider• Lewis• Moonlight• Numb3rs• Leverage• Sons of Anarchy• Warehouse 13• NCIS: Los Angeles• The Mentalist• Going Postal• Strike Back• Nikita• Criminal Minds: Suspect Behavior
When was the first hacker on TV?
1950s1960s1970s1980s1990s2000s
Would you believe?
1950s1960s1970s1980s1990s2000s
I thought it was...
1950s1960s1970s1980s1990s2000s
The Sweeney
• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
1960s
The Avengers
• Year: 1962 • Episode: The Big Thinker • Character: Dr. Farrow
Doctor Who
• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor
Star Trek
• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk
The Man from U.N.C.L.E
• Years: 1966• Episode: The Off-Broadway Affair • Character: David X. Machina
The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)
Dragnet 1969
• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and
Peggy Sue Thompson
1970s
The Sweeney
• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
Wonder Woman
• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)
Blake’s 7
• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon
1980s
Whiz Kids
• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,
Hamilton Parker and Jeremy Saldino
Whiz Kids
• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,
Hamilton Parker and Jeremy Saldino
1990s
The X-Files
The X-Files
The X-Files
The X-Files
The X-Files“CYBERSPACE”
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
2000s
Remakes
Based on comics
Sequels
Comparing the television to real life
In real life…Average age of a hacker?
0-25 years old25-50 years old50-75 years old
In real life…Average age of a hacker!
0-25 years old25-50 years old50-75 years old
On television…Age of Hackers
In real life…Occupations of hackers
• Mostly IT industry, with a
few full-time hackers.
On television… Occupation of hackers
In real life…Insider versus outsider attacks
• Might be 50/50, • might be anything
On television…
Hacking on Television
HACKING FEATURED
• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
Hacking on Television
HACKING FEATURED
• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
HACKING NOT FEATURED
• DoS Attacks• Phishing• Organisation ID Theft• eHarassment of employees
But…
• “teenagers sitting in their bedrooms ”
• “often high school or university students ”
Conclusion
OK so what does that tell us
• Is it us or them?
• We need to make it clearer
???
Questions
???