How Are Hackers Portrayed in Pop Culture?

How Are Hackers Portrayed in Pop Culture?


(upbeat music) – In the media you always
see a loan defender or a loan attacker working in isolation in front of 10 monitors all
arranged around them. It looks like NASA mission
control with encrypted text which looks like a
combination of Klingon and the Matrix and all over the place. To break in, someone says,
oh this is encrypted. Using this algorithm, give me a minute. Type, type, type, type,
type and all of that Klingon and Matrix style stuff turns into plain text and the attack succeeds. The reality is a little bit more bland. To attack a network, you tend
to need to do it successfully. You need to do your homework, that means that you need to spend some time observing what happens on the system
you’re trying to attack. Send some probes and develop
your attack over time. And this is a very long effort, it requires a lot of skill sometimes. And it’s definitely not immediate. It’s not click, click, click, click, click, I’ve compromised a system. The other critical difference
is the cryptography, the mathematics that defend our systems are typically the most secure part. There is this saying in computer security, trust math, trust the mathematics. The weakest component is where
human beings are involved. In the design of systems
and taking all these various components and adding them together and administering the system
and keeping our user names and passwords and other
credentials secure. This is really what a smart
attacker will go after. They’ll go after the human component, not the glitz that’s
portrayed in Hollywood.

Leave a Reply

Your email address will not be published. Required fields are marked *