session 4. boundary issues of internet security chair: victor ralevich

88
Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich

Upload: dima

Post on 06-Jan-2016

19 views

Category:

Documents


1 download

DESCRIPTION

Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich. Coming Soon. to a computer near you. a. Damian Gordon. production. HACKERS AND. But first, a story. A Long, long time ago…. A Long, long time ago…. UNNAMED ORGANISATION. A Long, long time ago…. Owner. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Session 4.

Boundary Issues of Internet Security

Chair: Victor Ralevich

Page 2: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

ComingSoon

Page 3: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

to a computer near you

Page 4: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Damian Gordon

production

a

Page 5: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

HACKERS AND

Page 6: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

But first, a story

Page 7: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A Long, long time ago…

Page 8: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A Long, long time ago…

UNNAMED ORGANISATION

Page 9: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A Long, long time ago…

me

My boss

My boss’s boss

Owner

Page 10: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A Long, long time ago…

me

My boss

My boss’s boss

Owner

Page 11: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A Long, long time ago…

me

My boss

My boss’s boss

Owner

Page 12: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

First task…

Create security policies for 17 companies

Page 13: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

= bewilderment

Page 14: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Security Policy

Security Policy

Risk Analysis

Page 15: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

Page 16: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

How do you identify threats?

“…experience and imagination…”

- Pfleeger and Pfleeger

Page 17: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Hacker Movies

Page 18: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

The work

• This research seeks to identify whether or not movies are accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.

Page 19: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Hacker vs Hacker

Page 20: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Data Collection

Page 21: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Grounded Theory

Page 22: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Six Principles

Page 23: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

A hacker movie must feature a hacker in it, It’s insufficient to have an act of hacking in the

movie, the hacker must appear.

I

Page 24: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Not all cyberpunk movies can automatically be considered as hacker

movies.

II

Page 25: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Only Science Fiction movies that feature

recognisable hacker scenarios

should be included.

III

Page 26: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

No animated movies will be considered.

IV

Page 27: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

No movies will be considered whose sole focus is cryptography.

V

Page 28: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

No hacker documentaries

will be considered, only movies.

VI

Page 29: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Resulting in…

Page 30: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 31: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

The Two Cultures?

Page 32: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

The Two Cultures?

Page 33: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

The Two Cultures?

TwoCultures?

Page 34: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

The Two Cultures?

TwoCultures?

Page 35: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

When was the first hacker movie?

1950s

1960s

1970s

1980s

1990s

2000s

Page 36: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Would you believe?

1950s

1960s

1970s

1980s

1990s

2000s

Page 37: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1950s

Page 38: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 39: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1960s

Page 40: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 41: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 42: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1970s

Page 43: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 44: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 45: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1980s

Page 46: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 47: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 48: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 49: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 50: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1990s

Page 51: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 52: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 53: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 54: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 55: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 56: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 57: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 58: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

2000s

Page 59: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 60: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

FORCED INTO HACKING

Page 61: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

INSIDER THREATS

Page 62: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

SEQUELS

Page 63: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Comparing the movies to real life

Page 64: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In real life…Average age of a hacker?

5-15 years old

15-25 years old

25-35 years old

35-45 years old

45-55 years old

55-65 years old

Page 65: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In real life…Average age of a hacker!

5-15 years old

15-25 years old

25-35 years old

35-45 years old

45-55 years old

55-65 years old

Page 66: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In the movies…Age of Hackers

Page 67: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In real life…Occupations of hackers

• Mostly IT industry, with a few full-time hackers.

Page 68: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In the movies…Occupation of hackers

Page 69: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In real life…Insider versus outsider attacks

• Might be as high as 50/50

Page 70: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

In the movies…

Page 71: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

But…

• “teenagers sitting in their bedrooms ”

• “often high school or university students ”

Page 72: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 73: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 74: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

1. Threat of destruction from US

2. Young hackers contacted by KGB

3. Monomyth

Page 75: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 76: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 77: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 78: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 79: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 80: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 81: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 82: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 83: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 84: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 85: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 86: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

Conclusion

OK so what does that tell us

• Is it us or them?

• We need to make it clearer

Page 87: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich
Page 88: Session 4.  Boundary Issues  of Internet Security Chair: Victor Ralevich

???

Questions

???