Top Banner

of 46

Cyber Security at the Cinema

Nov 17, 2014

ReportDownload

Documents

Cyber Security at the Cinemaby Adrian Mikeliunas, CISSP, CLP amikeliunas@worldbank.org

AgendaMovie Selection Criteria Overview of Cyber Security Top 7 Movie List Honorary Mentions Conclusion

01/19/10

2

Movies

Movies provideEntertainment Education

Many movies show how to:Break computer security, Hack, cheat, steal

Helps us get more prepared Work becomes more01/19/10

challenging

3

Selection CriteriaHacker has to be one of the main characters or movie ideas A Hacker is one who:

is proficient at using or programming a computer; a computer buff. uses programming skills to gain illegal access to a computer network or file

Two or more cyber security events in the movie (hacking, cracking, )

Cyber Security Events

Bypass Access controls ID,

Passwords, back doors, Biometrics Storage, Encryption

Bypass Physical Security Personnel,

Tamper Communications Electronic

commerce, Mail, Documents

Tamper Systems Development Change

crypto

controls, malware protection,

01/19/10

5

What is Cyber Security?

Computer Security [TECHNOLOGY]Access & Passwords Hacking / Cracking Viruses, Worms, & Trojans

Social Engineering [HUMAN]Personal Information Medical Records Personnel & Financial data Spam, Scams & Phishing http://www.antiphishing.org

01/19/10

6

Weakest Security Link

Human Element? Computer Element? Both?

Top Cyber Security MoviesWar Games Hackers The Net Matrix Trilogy Sneakers Tron

War Games-1983A young man finds a back door into a military central computer in which reality is confused with gameplaying, possibly starting World War III The main debate is: should humans be in charge of launching a nuclear strike or should a (fail safe) computer decide? Simple special effects, but realistic for that time. Movie grossed $75M.

War Games-(2)War Dialing: kids wants to connect to game company Back Door: modem access was for developer Easy to guess Password: Joshua Denial of Service: play tic-tac-toe to prove that in a nuclear war nobody wins!

The Net-1995

Angela Bennett is a software engineer working from home in Reston A client sends her a game program with a weird glitch for her to debug. On his way to meet her, hes killed in a plane crash Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record.

The Net (2)Identity Theft has become #1 crime in the world Many commercial programs contain Easter Eggs (or backdoors) http://www.eeggs.com Angela uses a keylogger & virus at the end to payback her attackers

Hackers-1995

A young boy is arrested by the Secret Service for writing a virus, and banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus. Unreal special hacking effects!

Hackers (2)

Remote take over of other computer systemsTV Station School fire alarm system Corporate Mainframe

Hacking in many instances

Matrix-1999A group of rebels free Neo, a computer hacker, in hope that he can stop the Matrix, a computer system that slaves mankind. In the second movie, Trinity uses a special hacking tool: nmap Great Sci-Fi trilogy, many special effects

Matrix (2)Neo is a hacker who gets hacked by Trinity in order to communicate inside the Matrix Trinity shuts down the power plant grid by exploiting an SSH vulnerability He goes back in to fight the agents and the Matrix, going out via a regular phone line

Sneakers-1993Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal. They recover a box that has the capability to decode all existing encryption systems around the world

TRON-1982A hacker is literally abducted into the world of a computer and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program. TRON (trace on) defeats the MCP (master control program) so his user can retrieve the stolen video game copyrights he owned.

Honorable MentionsSwordfish The Italian Job Catch me if you can Take Down Independence Day Gathaka Charlies Angels

Swordfish-2001The D.E.A. shut down its dummy corporation operation codenamed SWORDFISH in 1986, with $400M The world's most dangerous spy is hired by the CIA to coerce a computer hacker recently released from prison to help steal billions in unused government funds, but it's all locked away behind super-encryption.

Takedown-2000Kevin Mitnick is quite possibly the most well known hacker in the world Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...

ConclusionCyber Security is always under attack, prevention can help Protect your password Protect your company information assets & your personal information Get informed & Get Involved!

01/19/10

New Information Security Policy http://infosec New Information Security Training http://ISO17799

46