session 4. boundary issues of internet security chair: victor ralevich
DESCRIPTION
Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich. Coming Soon. to a computer near you. a. Damian Gordon. production. HACKERS AND. But first, a story. A Long, long time ago…. A Long, long time ago…. UNNAMED ORGANISATION. A Long, long time ago…. Owner. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/1.jpg)
Session 4.
Boundary Issues of Internet Security
Chair: Victor Ralevich
![Page 2: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/2.jpg)
ComingSoon
![Page 3: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/3.jpg)
to a computer near you
![Page 4: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/4.jpg)
Damian Gordon
production
a
![Page 5: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/5.jpg)
HACKERS AND
![Page 6: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/6.jpg)
But first, a story
![Page 7: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/7.jpg)
A Long, long time ago…
![Page 8: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/8.jpg)
A Long, long time ago…
UNNAMED ORGANISATION
![Page 9: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/9.jpg)
A Long, long time ago…
me
My boss
My boss’s boss
Owner
![Page 10: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/10.jpg)
A Long, long time ago…
me
My boss
My boss’s boss
Owner
![Page 11: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/11.jpg)
A Long, long time ago…
me
My boss
My boss’s boss
Owner
![Page 12: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/12.jpg)
First task…
Create security policies for 17 companies
![Page 13: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/13.jpg)
= bewilderment
![Page 14: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/14.jpg)
Security Policy
Security Policy
Risk Analysis
![Page 15: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/15.jpg)
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
![Page 16: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/16.jpg)
How do you identify threats?
“…experience and imagination…”
- Pfleeger and Pfleeger
![Page 17: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/17.jpg)
Hacker Movies
![Page 18: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/18.jpg)
The work
• This research seeks to identify whether or not movies are accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
![Page 19: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/19.jpg)
Hacker vs Hacker
![Page 20: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/20.jpg)
Data Collection
![Page 21: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/21.jpg)
Grounded Theory
![Page 22: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/22.jpg)
Six Principles
![Page 23: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/23.jpg)
A hacker movie must feature a hacker in it, It’s insufficient to have an act of hacking in the
movie, the hacker must appear.
I
![Page 24: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/24.jpg)
Not all cyberpunk movies can automatically be considered as hacker
movies.
II
![Page 25: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/25.jpg)
Only Science Fiction movies that feature
recognisable hacker scenarios
should be included.
III
![Page 26: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/26.jpg)
No animated movies will be considered.
IV
![Page 27: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/27.jpg)
No movies will be considered whose sole focus is cryptography.
V
![Page 28: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/28.jpg)
No hacker documentaries
will be considered, only movies.
VI
![Page 29: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/29.jpg)
Resulting in…
![Page 30: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/30.jpg)
![Page 31: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/31.jpg)
The Two Cultures?
![Page 32: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/32.jpg)
The Two Cultures?
![Page 33: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/33.jpg)
The Two Cultures?
TwoCultures?
![Page 34: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/34.jpg)
The Two Cultures?
TwoCultures?
![Page 35: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/35.jpg)
When was the first hacker movie?
1950s
1960s
1970s
1980s
1990s
2000s
![Page 36: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/36.jpg)
Would you believe?
1950s
1960s
1970s
1980s
1990s
2000s
![Page 37: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/37.jpg)
1950s
![Page 38: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/38.jpg)
![Page 39: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/39.jpg)
1960s
![Page 40: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/40.jpg)
![Page 41: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/41.jpg)
![Page 42: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/42.jpg)
1970s
![Page 43: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/43.jpg)
![Page 44: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/44.jpg)
![Page 45: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/45.jpg)
1980s
![Page 46: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/46.jpg)
![Page 47: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/47.jpg)
![Page 48: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/48.jpg)
![Page 49: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/49.jpg)
![Page 50: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/50.jpg)
1990s
![Page 51: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/51.jpg)
![Page 52: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/52.jpg)
![Page 53: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/53.jpg)
![Page 54: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/54.jpg)
![Page 55: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/55.jpg)
![Page 56: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/56.jpg)
![Page 57: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/57.jpg)
![Page 58: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/58.jpg)
2000s
![Page 59: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/59.jpg)
![Page 60: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/60.jpg)
FORCED INTO HACKING
![Page 61: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/61.jpg)
INSIDER THREATS
![Page 62: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/62.jpg)
SEQUELS
![Page 63: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/63.jpg)
Comparing the movies to real life
![Page 64: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/64.jpg)
In real life…Average age of a hacker?
5-15 years old
15-25 years old
25-35 years old
35-45 years old
45-55 years old
55-65 years old
![Page 65: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/65.jpg)
In real life…Average age of a hacker!
5-15 years old
15-25 years old
25-35 years old
35-45 years old
45-55 years old
55-65 years old
![Page 66: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/66.jpg)
In the movies…Age of Hackers
![Page 67: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/67.jpg)
In real life…Occupations of hackers
• Mostly IT industry, with a few full-time hackers.
![Page 68: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/68.jpg)
In the movies…Occupation of hackers
![Page 69: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/69.jpg)
In real life…Insider versus outsider attacks
• Might be as high as 50/50
![Page 70: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/70.jpg)
In the movies…
![Page 71: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/71.jpg)
But…
• “teenagers sitting in their bedrooms ”
• “often high school or university students ”
![Page 72: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/72.jpg)
![Page 73: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/73.jpg)
![Page 74: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/74.jpg)
1. Threat of destruction from US
2. Young hackers contacted by KGB
3. Monomyth
![Page 75: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/75.jpg)
![Page 76: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/76.jpg)
![Page 77: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/77.jpg)
![Page 78: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/78.jpg)
![Page 79: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/79.jpg)
![Page 80: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/80.jpg)
![Page 81: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/81.jpg)
![Page 82: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/82.jpg)
![Page 83: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/83.jpg)
![Page 84: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/84.jpg)
![Page 85: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/85.jpg)
![Page 86: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/86.jpg)
Conclusion
OK so what does that tell us
• Is it us or them?
• We need to make it clearer
![Page 87: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/87.jpg)
![Page 88: Session 4. Boundary Issues of Internet Security Chair: Victor Ralevich](https://reader035.vdocuments.mx/reader035/viewer/2022070404/56813bfa550346895da5435b/html5/thumbnails/88.jpg)
???
Questions
???