Professional Documents
Culture Documents
at the Cinema
by Adrian Mikeliunas, CISSP, CLP
amikeliunas@worldbank.org
Agenda
Movie Selection Criteria
Overview of Cyber Security
Top 7 Movie List
Honorary Mentions
Conclusion
01/19/10 2
Movies
Movies provide
Entertainment
Education
01/19/10 5
What is Cyber Security?
Computer Security [TECHNOLOGY]
Access & Passwords
Hacking / Cracking
Viruses, Worms, & Trojans
01/19/10 http://www.antiphishing.org 6
Weakest Security Link
Human Element?
Computer Element?
Both?
Top Cyber Security
Movies
War Games
Hackers
The Net
Matrix Trilogy
Sneakers
Tron
War Games-1983
A young man finds a back door into a
military central computer in which
reality is confused with game-
playing, possibly starting World War
III
The main debate is: should humans be
in charge of launching a nuclear strike
or should a (fail safe) computer decide?
Simple special effects, but realistic for
that time. Movie grossed $75M.
War Games-(2)
War Dialing: kids wants to connect to
game company
Back Door: modem access was for
developer
Easy to guess Password: Joshua
Denial of Service: play tic-tac-toe to
prove that in a nuclear war nobody
wins!
The Net-1995
Angela Bennett is a software engineer
working from home in Reston
A client sends her a game program with a
weird glitch for her to debug. On his way
to meet her, he’s killed in a plane crash
Angela discovers secret information on
the disk she has received only hours
before she leaves for vacation.
Her life then turns into a nightmare, her
records are erased from existence and
she is given a new identity, one with a
police record.
The Net (2)
Identity Theft has become #1
crime in the world
Many commercial programs
contain Easter Eggs (or
backdoors) http://www.eeggs.com
Angela uses a keylogger & virus
at the end to payback her
attackers
Hackers-1995
A young boy is arrested by the Secret Service
for writing a virus, and banned from using a
computer until his 18th birthday.
Years later, he and his new-found friends
discover a plot to unleash a dangerous
computer virus, but must use their computer
skills to find the evidence while being
pursued by the Secret Service and the evil
computer genius behind the virus.
Unreal special “hacking” effects!
Hackers (2)
Remote take over of other
computer systems
TV Station
School fire alarm system
Corporate Mainframe