{"id":6087,"date":"2018-12-27T09:45:13","date_gmt":"2018-12-27T15:45:13","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6087"},"modified":"2019-04-25T15:24:28","modified_gmt":"2019-04-25T20:24:28","slug":"cyber-security-in-the-movies-is-it-realistic","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/cyber-security-in-the-movies-is-it-realistic\/","title":{"rendered":"Cyber Security in the Movies \u2013 Is It Realistic?"},"content":{"rendered":"<p style=\"line-height: 150%;\"><span style=\"color: #000000;\"><strong><span style=\"font-family: verdana, geneva;\">By Des Nnochiri<\/span><\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: \u201cI\u2019m in.\u201d That\u2019s it\u2013 they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building\u2019s security system. <\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">If that\u2019s how things worked in real life, the world would always be on the edge of apocalypse. None of our data stored online would be safe, and we\u2019d be constantly held for ransom by cyber terrorists. So, why does Hollywood paint a picture of flimsy security systems so easily infiltrated by bad guys who want to ruin our lives and bring down governments? More importantly, do the movies actually get any of it right? <\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">The Target<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Most hackers are not trying to break into the White House or Homeland Security (although it <a href=\"https:\/\/www.bbc.co.uk\/news\/world-us-canada-33017310\" rel=\"nofollow\" target=\"_blank\">has happened<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> in the past). Anyone who has a games console, Netflix account, or even just an email address knows that data security breaches regularly happen on a very small scale, more to cause a nuisance than anything else. As a result, both businesses and internet users have had to improve security over the years.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">The requirements for passwords are now more complicated than ever, and we all know the risks of using the same one twice. Still, breaches continue to happen regularly at a consumer level. This isn\u2019t something that\u2019s been explored much in film, presumably because it\u2019s such an ordinary occurrence, like paying bills and getting the bus, and the stakes are perhaps a bit too low for a blockbuster. Audiences, indeed, probably wouldn\u2019t be interested in reliving such events in cinemas. \u00a0<\/span><\/p>\n<figure id=\"attachment_6096\" aria-describedby=\"caption-attachment-6096\" style=\"width: 325px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6096\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-1-300x168.jpg\" alt=\"\" width=\"325\" height=\"182\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-1-300x168.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-1-768x430.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-1.jpg 1000w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\"><\/a><figcaption id=\"caption-attachment-6096\" class=\"wp-caption-text\"><span style=\"font-family: verdana, geneva, sans-serif;\">Source: www.dorkly.com<\/span><\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">If you look at some of the <a href=\"https:\/\/www.techworld.com\/security\/uks-most-infamous-data-breaches-3604586\/\" rel=\"nofollow\" target=\"_blank\">most infamous<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> security breaches of the past decade, most of them involve private customer data; and yet, the average person does not lose money in these large-scale cyber-attacks. In fact, most of the money companies lose in a data breach comes as a result of legal expenses and <a href=\"https:\/\/newsroom.ibm.com\/2018-07-10-IBM-Study-Hidden-Costs-of-Data-Breaches-Increase-Expenses-for-Businesses\" rel=\"nofollow\" target=\"_blank\">loss of customers<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, rather than from the attacks themselves.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Another thing to note is that, in a lot of films, the breach takes place on location. Not only does the attacker need to get into a computer system, they first have to get past physical security by entering the building where the server is held. Again, this is generally unrealistic, as most attacks take place remotely. This is because buildings which house secure servers have numerous barriers in place to prevent unauthorized people from entering. They are also checked too regularly for anyone to be able to spend enough time there, as hacking is not a 30-second job.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">The Hacker<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">In the movies, the hacker usually takes one of two forms: a Robin Hood figure or a criminal mastermind. Their motives are clearly defined, and they often lay out their plans to the audience. Unfortunately, when cyber security attacks really take place in real life, we don\u2019t always hear from the perpetrators and we might never know what their true goals were.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Movies would be less exciting if, instead of being played by a cunning Chris Hemsworth-type, cyber criminals were all shown to be people like systems administrator Gary McKinnon. McKinnon <span style=\"color: blue;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-28524909\" rel=\"nofollow\" target=\"_blank\">made headlines<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> in 2002 for hacking into NASA in search of UFO evidence and spent a decade fighting extradition to the US. He is now permitted to work with computers again.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Aside from being incredibly adept with computers, there isn\u2019t much to set McKinnon apart from the average person. He claimed not to have any malevolent intentions when he committed the hacking, and he did not serve prison time as a result. Though it\u2019s an interesting story to hear, it would be hard to turn it into something cinematic.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<figure id=\"attachment_6095\" aria-describedby=\"caption-attachment-6095\" style=\"width: 325px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6095\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-2-300x168.jpg\" alt=\"\" width=\"325\" height=\"182\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-2-300x168.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-2-768x430.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-2.jpg 1000w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\"><\/a><figcaption id=\"caption-attachment-6095\" class=\"wp-caption-text\"><span style=\"font-family: verdana, geneva, sans-serif;\"> Source: www.dorkly.com<\/span><\/figcaption><\/figure>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Most of the time, the real hacking isn\u2019t done by a person at all; it\u2019s done by a computer program someone has set up to run. Why? Because, even for a computer, hacking can take hours, or even days. Would you watch a 14-hour long Mission Impossible film with no guns and no action and just a computer screen? Probably not.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Getting In \u2013 How it Really Works<\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">A lot of the time, hacking attempts fail, and not just for dramatic cinematic effect. Real security systems are more robust than Hollywood would have you believe, and most security breaches get thwarted by multiple layers of complex security measures, with encryption being one of the most popular and most difficult to circumvent.<\/span><\/p>\n<p>\u00a0<\/p>\n<figure id=\"attachment_6093\" aria-describedby=\"caption-attachment-6093\" style=\"width: 325px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6093\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-3-300x168.jpg\" alt=\"\" width=\"325\" height=\"182\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-3-300x168.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-3-768x430.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/01\/hacking-reality-3.jpg 1000w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\"><\/a><figcaption id=\"caption-attachment-6093\" class=\"wp-caption-text\"><span style=\"font-family: verdana, geneva, sans-serif;\">Source: www.dorkly.com<\/span><\/figcaption><\/figure>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Encryption is a cool concept and an effective security measure, but it\u2019s not very exciting to see in action. The easiest way for a hacker to get around encryption is to have the key, which would make it as simple as entering a password. <\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">We have seen this in films in the past, with a bit of story as to how the key came into the terrorist\u2019s hands, and those cases are often fairly close to reality.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">It\u2019s less common\u2014though still sometimes effective\u2014for a hacker to set up a program that will enter every possible decryption key until it finds the right one. Expensive high-level security systems have safeguards against this type of attack, and although it could work for something smaller and less secure, the time it would take would most likely not be worth the reward.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">Final Thoughts <\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-family: verdana, geneva;\">The reality of cyber security is difficult to make visually exciting, but with so much of our lives now stored digitally, filmmakers will continue to explore this topic. Ultimately, a film doesn\u2019t need to be realistic to be enjoyable.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Des Nnochiri \u00a0 Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: \u201cI\u2019m in.\u201d That\u2019s it\u2013 they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building\u2019s security [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6092,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[310,318,314,266,315,316,23,43,312,269,202,317,79,309,308,282,283,307,313,29,270,311],"class_list":["post-6087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security","tag-code","tag-cyber-attack","tag-cyber-criminals","tag-cyber-security","tag-cyber-terrorism","tag-cyber-terrorists","tag-data","tag-data-breach","tag-data-hacking","tag-data-storage","tag-encryption","tag-hacker","tag-hacking","tag-hollywood","tag-movies","tag-password","tag-password-protection","tag-realistic","tag-realistic-hacking","tag-security","tag-security-breach","tag-security-system"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6087"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6087\/revisions"}],"predecessor-version":[{"id":6451,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6087\/revisions\/6451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6092"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}