hackers and hollywood 2: considering televisual cyberthreats in security risk analysis
Post on 21-Oct-2014
1.010 views
DESCRIPTION
TRANSCRIPT
![Page 1: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/1.jpg)
Hackers and Hollywood 2:Considering Televisual Cyberthreats
In Security Risk Analysis
![Page 2: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/2.jpg)
THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR
APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.
THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR
APPROPRIATE AUDIENCESBY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.
www.filmratings.com www.mpaa.comwww.filmratings.com www.mpaa.com
![Page 3: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/3.jpg)
ComingSoon
![Page 4: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/4.jpg)
to a computer near you
![Page 5: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/5.jpg)
The Dublin Institute of Technology proudly presents…
![Page 6: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/6.jpg)
Damian Gordon
production
a
![Page 7: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/7.jpg)
![Page 8: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/8.jpg)
![Page 9: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/9.jpg)
Hackers and HollywoodConsidering Televisual Cyberthreats
In Security Risk Analysis
![Page 10: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/10.jpg)
Hackers and HollywoodConsidering Televisual Cyberthreats
In Security Risk Analysis
![Page 11: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/11.jpg)
But first, a story
![Page 12: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/12.jpg)
![Page 13: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/13.jpg)
Years and years ago…
![Page 14: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/14.jpg)
Years and years ago…
UNNAMED ORGANISATION
![Page 15: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/15.jpg)
Years and years ago…
me
My boss
My boss’s boss
Owner
![Page 16: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/16.jpg)
Years and years ago…
me
My boss
My boss’s boss
Owner
![Page 17: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/17.jpg)
Years and years ago…
me
My boss
My boss’s boss
Owner
![Page 18: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/18.jpg)
First task…
Create security policies for 14 companies
![Page 19: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/19.jpg)
= bewilderment
![Page 20: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/20.jpg)
Security Policy
Security Policy
Risk Analysis
![Page 21: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/21.jpg)
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
![Page 22: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/22.jpg)
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
![Page 23: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/23.jpg)
Hackers on Television
![Page 24: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/24.jpg)
The work
• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
![Page 25: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/25.jpg)
![Page 26: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/26.jpg)
“I’ll create a GUI interface using Visual
Basic…see if I can track an IP address.”
![Page 27: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/27.jpg)
Hacker vs Hacker
![Page 28: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/28.jpg)
Data Collection
![Page 29: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/29.jpg)
Hermeneutic Phenomenology
![Page 30: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/30.jpg)
Six Principles
![Page 31: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/31.jpg)
The show must feature a hacker in it, and the hacker must be well-developed character
I
![Page 32: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/32.jpg)
Once a hacker character has been shown to hack a few times, they don’t
have to hack in each episode to be still
considered a hacker.
II
![Page 33: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/33.jpg)
No animated television shows will be considered.
III
![Page 34: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/34.jpg)
If a show introduces a hacker group, all the
members are counted, even if only some of
them are shown hacking.
IV
![Page 35: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/35.jpg)
When a hacker appears on a different TV show, they don’t need to be
shown to be hacking in the new show for it to
count.
V
![Page 36: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/36.jpg)
No hacker documentaries will
be considered, only television
shows.
VI
![Page 37: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/37.jpg)
Resulting in…
![Page 38: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/38.jpg)
80 Television Shows• The Avengers• Doctor Who• Star Trek• The Man from U.N.C.L.E• The Prisoner• Dragnet 1969• The Sweeney • Wonder Woman• Blake's 7• Simon & Simon• The Greatest American Hero• Whiz Kids• Automan• Knight Rider• Riptide• Airwolf• Blue Thunder• The Paper Chase• V: The Series• Max Headroom: UK Pilot
• Stingray (NBC)• MacGyver• Max Headroom• Inspector Morse• The Powers That Be• Ghostwriter• SeaQuest DSV• Weird Science• The X-Files• VR.5• Nowhere Man• Profiler• Team Knight Rider• La Femme Nikita• Buffy the Vampire Slayer• Millennium• Diagnosis Murder• The Net• First Wave• Total Recall 2070
• Walker, Texas Ranger• Level 9• Dark Angel• The Outer Limits• The Lone Gunmen• Alias• Smallville• Spooks• Birds of Prey• Jake 2.0• 24• Battlestar Galactica• JAG• NCIS• Veronica Mars• Hustle• CSI: NY• Criminal Minds• Torchwood• Global Frequency
• Heroes• Eureka (A Town Called Eureka)• Halfway Home• The Kill Point• The Bionic Woman• Chuck• Terminator• Knight Rider• Lewis• Moonlight• Numb3rs• Leverage• Sons of Anarchy• Warehouse 13• NCIS: Los Angeles• The Mentalist• Going Postal• Strike Back• Nikita• Criminal Minds: Suspect Behavior
![Page 39: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/39.jpg)
When was the first hacker on TV?
1950s1960s1970s1980s1990s2000s
![Page 40: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/40.jpg)
Would you believe?
1950s1960s1970s1980s1990s2000s
![Page 41: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/41.jpg)
I thought it was...
1950s1960s1970s1980s1990s2000s
![Page 42: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/42.jpg)
The Sweeney
• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
![Page 43: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/43.jpg)
1960s
![Page 44: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/44.jpg)
![Page 45: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/45.jpg)
The Avengers
• Year: 1962 • Episode: The Big Thinker • Character: Dr. Farrow
![Page 46: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/46.jpg)
Doctor Who
• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor
![Page 47: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/47.jpg)
Star Trek
• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk
![Page 48: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/48.jpg)
The Man from U.N.C.L.E
• Years: 1966• Episode: The Off-Broadway Affair • Character: David X. Machina
![Page 49: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/49.jpg)
The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)
![Page 50: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/50.jpg)
Dragnet 1969
• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and
Peggy Sue Thompson
![Page 51: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/51.jpg)
1970s
![Page 52: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/52.jpg)
![Page 53: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/53.jpg)
The Sweeney
• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
![Page 54: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/54.jpg)
Wonder Woman
• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)
![Page 55: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/55.jpg)
Blake’s 7
• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon
![Page 56: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/56.jpg)
1980s
![Page 57: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/57.jpg)
![Page 58: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/58.jpg)
Whiz Kids
• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,
Hamilton Parker and Jeremy Saldino
![Page 59: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/59.jpg)
Whiz Kids
• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler,
Hamilton Parker and Jeremy Saldino
![Page 60: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/60.jpg)
![Page 61: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/61.jpg)
![Page 62: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/62.jpg)
![Page 63: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/63.jpg)
1990s
![Page 64: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/64.jpg)
![Page 65: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/65.jpg)
The X-Files
![Page 66: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/66.jpg)
The X-Files
![Page 67: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/67.jpg)
The X-Files
![Page 68: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/68.jpg)
The X-Files
![Page 69: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/69.jpg)
The X-Files“CYBERSPACE”
![Page 70: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/70.jpg)
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
![Page 71: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/71.jpg)
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
![Page 72: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/72.jpg)
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
![Page 73: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/73.jpg)
Diagnosis: Murder
• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd
Harcourt, Tapley and J.W.
![Page 74: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/74.jpg)
2000s
![Page 75: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/75.jpg)
![Page 76: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/76.jpg)
![Page 77: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/77.jpg)
Remakes
![Page 78: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/78.jpg)
Based on comics
![Page 79: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/79.jpg)
Sequels
![Page 80: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/80.jpg)
Comparing the television to real life
![Page 81: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/81.jpg)
In real life…Average age of a hacker?
0-25 years old25-50 years old50-75 years old
![Page 82: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/82.jpg)
In real life…Average age of a hacker!
0-25 years old25-50 years old50-75 years old
![Page 83: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/83.jpg)
On television…Age of Hackers
![Page 84: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/84.jpg)
In real life…Occupations of hackers
• Mostly IT industry, with a
few full-time hackers.
![Page 85: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/85.jpg)
On television… Occupation of hackers
![Page 86: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/86.jpg)
In real life…Insider versus outsider attacks
• Might be 50/50, • might be anything
![Page 87: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/87.jpg)
On television…
![Page 88: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/88.jpg)
Hacking on Television
HACKING FEATURED
• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
![Page 89: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/89.jpg)
Hacking on Television
HACKING FEATURED
• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
HACKING NOT FEATURED
• DoS Attacks• Phishing• Organisation ID Theft• eHarassment of employees
![Page 90: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/90.jpg)
But…
• “teenagers sitting in their bedrooms ”
• “often high school or university students ”
![Page 91: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/91.jpg)
Conclusion
OK so what does that tell us
• Is it us or them?
• We need to make it clearer
![Page 92: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/92.jpg)
![Page 93: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/93.jpg)
![Page 94: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/94.jpg)
???
Questions
???
![Page 95: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/95.jpg)
![Page 96: Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis](https://reader033.vdocuments.site/reader033/viewer/2022061106/54470ecdafaf9f51178b489a/html5/thumbnails/96.jpg)