1. Cyber Security at the Cinema by Adrian Mikeliunas, CISSP, CLP [email_address]
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
Notas del editor
This powerpoint is part of our Information Security Awareness series for the Information Solutions Netwok (ISN)
Based on Information security Policy: Rules that govern the use of Information Systems: Classification in increasing order: public, private, confidential, company secret Access controls: passwords, tokens, back doors, biometrics Information classification Public, private, confidential, company secret
Nigerian scam Hacking
Ask audience to understand their ideas on this…
http://www.imdb.com/title/tt0086567/
David & Jennifer David shows Jen he change his (and hers) grades by hacking into the school’s server.
David wants to connect to game company using war dialer. Here he’s entering the area code suffix start end points.
Once he finds the “game” company he starts playing a game from the menu: Thermonuclear war, not knowing….
That is not a game, but he patched into the back door of a secure system that runs the NORAD nuclear weapons system
At the end of the movie, while the NORAD computer is about to start the 3 rd World War, David tricks the computer learning system to play tic-tac-to, eventually realizing nobody wins…
Then, having learned that, it starts estimating potential launch points and counterpoints for nuclear attack, And just line in tic-tac-to, …
Nobody wins
http://www.imdb.com/title/tt0113957/
Angela receives a strange disk from a client with a secret back door
Here she tricks her pursuers by thinking she’s going to send the evidence…
Then she plants a keylogger in her corporate computer, Later she infects the Pretorians (her enemy) mainframe program with a virus.
http://www.imdb.com/title/tt0113243/
Dade & Kate realize they are both hackers fighting a common enemy
In the first movie, Neo gets hacked by Trinity and she types “Wake up Neo” at minute 7:16, then “Follow the white rabbit” so she can meet him later.
At 30:40 monitoring the Matrix code.
At 2:05:30 Neo realizes he’s the One, and can see the Matrix for what it really is: 0 & 1s!
On the second movie 1:47:40 to 1:48:25 also The movie clip [matrix-hack.mov] available at http://images.insecure.org/nmap/images/matrix/
Here’s the nmap + ssh exploit
http://www.imdb.com/title/tt0105435/
http://www.imdb.com/title/tt0084827/
Alan (Tron) and Lora (both computer software engineers) & Dr. Walter Gibbs meet at the plant while our out of work hacker Kevin tries to get in…
But the computer fights back and digitizes him, placing him inside like another software program
Where he has to fight back all the way to freedom
Playing mortal freesbee games, gladiator style
All to get access to the copyright notice claiming that he was the real author of the space paranoids game that make the company rich instead of the evil Master Control Program---Ed Dillinger.