SlideShare uma empresa Scribd logo
1 de 46
Cyber Security  at the Cinema by Adrian Mikeliunas, CISSP, CLP  [email_address]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Movies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Selection Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Security Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Cyber Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Weakest Security Link ,[object Object],[object Object],[object Object]
Top Cyber Security Movies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
War Games-1983 ,[object Object],[object Object],[object Object]
War Games-(2) ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
The Net-1995 ,[object Object],[object Object],[object Object],[object Object]
The Net (2) ,[object Object],[object Object],[object Object]
 
 
 
Hackers-1995 ,[object Object],[object Object],[object Object]
Hackers (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Matrix-1999 ,[object Object],[object Object],[object Object]
Matrix (2) ,[object Object],[object Object],[object Object]
 
 
 
 
 
Sneakers-1993 ,[object Object],[object Object]
 
TRON-1982 ,[object Object],[object Object]
 
 
 
 
 
Honorable Mentions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Swordfish-2001 ,[object Object],[object Object]
Takedown-2000 ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
yanizaki
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
anbersattar
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
James Ruffer
 
ดูเอา ผมงง
ดูเอา ผมงงดูเอา ผมงง
ดูเอา ผมงง
dexseple
 
Hacker culture
Hacker cultureHacker culture
Hacker culture
Jack Hsu
 

Mais procurados (20)

"Hacking"
"Hacking""Hacking"
"Hacking"
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
 
Hacking
Hacking Hacking
Hacking
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
ดูเอา ผมงง
ดูเอา ผมงงดูเอา ผมงง
ดูเอา ผมงง
 
Hacking
HackingHacking
Hacking
 
Hacker culture
Hacker cultureHacker culture
Hacker culture
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Semelhante a Cyber Security At The Cinema

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 

Semelhante a Cyber Security At The Cinema (20)

Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering AdversariesHacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 

Mais de Adrian Mikeliunas

Mais de Adrian Mikeliunas (18)

Office Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxOffice Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptx
 
WordPress Security 2018
WordPress Security 2018WordPress Security 2018
WordPress Security 2018
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Introduction to WordPress Class 6
Introduction to WordPress Class 6Introduction to WordPress Class 6
Introduction to WordPress Class 6
 
Introduction to WordPress Class 5
Introduction to WordPress Class 5Introduction to WordPress Class 5
Introduction to WordPress Class 5
 
Introduction to WordPress Class 4
Introduction to WordPress Class 4Introduction to WordPress Class 4
Introduction to WordPress Class 4
 
Introduction to WordPress Class 3
Introduction to WordPress Class 3Introduction to WordPress Class 3
Introduction to WordPress Class 3
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2
 
Genymotion Android fast development
Genymotion Android fast development Genymotion Android fast development
Genymotion Android fast development
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Linux introduction Class 03
Linux introduction Class 03Linux introduction Class 03
Linux introduction Class 03
 
Linux introduction Class 02
Linux introduction Class 02Linux introduction Class 02
Linux introduction Class 02
 
Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
 
Introduction to WordPress Class 1
Introduction to WordPress Class 1Introduction to WordPress Class 1
Introduction to WordPress Class 1
 
Task deck
Task deckTask deck
Task deck
 
Ii 1500-publishing your android application
Ii 1500-publishing your android applicationIi 1500-publishing your android application
Ii 1500-publishing your android application
 
Ii 1300-java essentials for android
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for android
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profit
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Cyber Security At The Cinema

Notas do Editor

  1. This powerpoint is part of our Information Security Awareness series for the Information Solutions Netwok (ISN)
  2. Based on Information security Policy: Rules that govern the use of Information Systems: Classification in increasing order: public, private, confidential, company secret Access controls: passwords, tokens, back doors, biometrics Information classification Public, private, confidential, company secret
  3. Nigerian scam Hacking
  4. Ask audience to understand their ideas on this…
  5. http://www.imdb.com/title/tt0086567/
  6. David & Jennifer David shows Jen he change his (and hers) grades by hacking into the school’s server.
  7. David wants to connect to game company using war dialer. Here he’s entering the area code suffix start end points.
  8. Once he finds the “game” company he starts playing a game from the menu: Thermonuclear war, not knowing….
  9. That is not a game, but he patched into the back door of a secure system that runs the NORAD nuclear weapons system
  10. At the end of the movie, while the NORAD computer is about to start the 3 rd World War, David tricks the computer learning system to play tic-tac-to, eventually realizing nobody wins…
  11. Then, having learned that, it starts estimating potential launch points and counterpoints for nuclear attack, And just line in tic-tac-to, …
  12. Nobody wins
  13. http://www.imdb.com/title/tt0113957/
  14. Angela receives a strange disk from a client with a secret back door
  15. Here she tricks her pursuers by thinking she’s going to send the evidence…
  16. Then she plants a keylogger in her corporate computer, Later she infects the Pretorians (her enemy) mainframe program with a virus.
  17. http://www.imdb.com/title/tt0113243/
  18. Dade & Kate realize they are both hackers fighting a common enemy
  19. While attacking the mainframe of EMC
  20. http://www.imdb.com/title/tt0133093/ http://www.imdb.com/title/tt0234215/ http://www.imdb.com/title/tt0242653/
  21. In the first movie, Neo gets hacked by Trinity and she types “Wake up Neo” at minute 7:16, then “Follow the white rabbit” so she can meet him later.
  22. At 30:40 monitoring the Matrix code.
  23. At 2:05:30 Neo realizes he’s the One, and can see the Matrix for what it really is: 0 & 1s!
  24. On the second movie 1:47:40 to 1:48:25 also The movie clip [matrix-hack.mov] available at http://images.insecure.org/nmap/images/matrix/
  25. Here’s the nmap + ssh exploit
  26. http://www.imdb.com/title/tt0105435/
  27. http://www.imdb.com/title/tt0084827/
  28. Alan (Tron) and Lora (both computer software engineers) & Dr. Walter Gibbs meet at the plant while our out of work hacker Kevin tries to get in…
  29. But the computer fights back and digitizes him, placing him inside like another software program
  30. Where he has to fight back all the way to freedom
  31. Playing mortal freesbee games, gladiator style
  32. All to get access to the copyright notice claiming that he was the real author of the space paranoids game that make the company rich instead of the evil Master Control Program---Ed Dillinger.
  33. http://www.imdb.com/title/tt0244244/
  34. http://www.imdb.com/title/tt0159784/