890 likes | 1.04k Vues
Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich. Coming Soon. to a computer near you. a. Damian Gordon. production. HACKERS AND. But first, a story. A Long, long time ago…. A Long, long time ago…. UNNAMED ORGANISATION. A Long, long time ago…. Owner.
E N D
Session 4. Boundary Issues of Internet SecurityChair: Victor Ralevich
a Damian Gordon production
A Long, long time ago… UNNAMED ORGANISATION
A Long, long time ago… Owner My boss’s boss My boss me
A Long, long time ago… Owner My boss’s boss My boss me
A Long, long time ago… Owner My boss’s boss My boss me
First task… Create security policies for 17 companies
Security Policy Risk Analysis Security Policy
How do you identify threats? “…experience and imagination…” - Pfleeger and Pfleeger
How do you identify threats? “…experience and imagination…” - Pfleeger and Pfleeger
The work • This research seeks to identify whether or not movies are accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
Data Collection Books Websites 200 Hacker Movies
Six Principles I IV II V VI III
I A hacker movie must feature a hacker in it, It’s insufficient to have an act of hacking in the movie, the hacker must appear.
II Not all cyberpunk movies can automatically be considered as hacker movies.
III Only Science Fiction movies that feature recognisable hacker scenarios should be included.
IV No animated movies will be considered.
V No movies will be considered whose sole focus is cryptography.
VI No hacker documentaries will be considered, only movies.
Resulting in… 50 Hacker Movies
The Two Cultures? Two Cultures?
The Two Cultures? Two Cultures?
When was the first hacker movie? 1950s 1960s 1970s 1980s 1990s 2000s
Would you believe? 1950s 1960s 1970s 1980s 1990s 2000s