{"id":813,"date":"2016-07-12T22:17:52","date_gmt":"2016-07-12T20:17:52","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=813"},"modified":"2023-06-07T14:41:21","modified_gmt":"2023-06-07T12:41:21","slug":"it-security-in-film-and-fiction","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/12\/it-security-in-film-and-fiction\/","title":{"rendered":"IT-Security in film and fiction"},"content":{"rendered":"<p style=\"text-align: left;\">Probably everybody with a background in computer science has already seen a hollywood blockbuster or read a critically acclaimed book which alluded IT-security. It is a popular topic which allows to play with the expectations and fears of the audience. Government agencies are hacked within seconds, security failures happen everywhere, destructive malware infects machines on a global scale and nobody is safe if you are a master hacker. At least this is the general picture that different authors paint in their scenarios.<br \/>\n<!--more--><\/p>\n<p>If you are a bit familiar with the context of computer science and IT-security you often find yourself smiling at these mostly catastrophic stories and the lacking background knowledge of the people in charge. Of course this is not exclusively a problem of IT-security, the same probably goes for archeologists that watch Jurassic Park. In the context of the module IT-Security we wanted to pursue our enthusiasm for fiction and investigate if there actually are authors that get the details right and might even portrayed a scenario which happened in reality.<\/p>\n<p>As we are highly competent graduate students and have a somewhat scientific claim, we had two initial guiding questions for our research which we wanted to examine in reference to different books and movies.<\/p>\n<p>1) How similar are fiction and reality regarding IT-Security?<\/p>\n<p>2) Can fiction raise awareness regarding IT-Security?<\/p>\n<p>We looked at the concrete IT-security threat described in the book or movie and discussed whether we think it was realistic and if so, if there was a similar scenario in reality. We also evaluated questions that ensued from the scenario.<\/p>\n<p>After going through every scenario we noticed certain topics that repeatedly came up, which lead us to believe that these topic currently need most evaluation in society in general. The central topics we identified in fiction are: Surveillance, Hacktivism and Cyberwar. Surveillance is a widely discussed topic since whistleblower Edward Snowden uncovered the mode of operation of the NSA. The topic of Hacktivism is about a single person or a group of highly skilled hackers using their skills for good or bad. And fiction in the area of Cyberwar describes cyber attacks initiated by terrorists or governments, which target critical infrastructure, for example power plants. These attacks lead to the collapse of cities, regions or whole countries. &nbsp;In the following we will present the scenarios we looked at and sum up our results.<\/p>\n<p><b>Evaluation<\/b><\/p>\n<p>For the area of <i>Surveillance<\/i> we evaluated the books ZERO by Marc Elsberg from 2014 and Digital Fortress by Dan Brown, which was published in 1996. ZERO follows a journalist as she uncovers the truth behind a malicious social network that promises its users a better life in exchange for all their data. In Digital Fortress the NSA that usually has it\u2019s eyes on everyone else\u2019s secrets, is attacked itself by an algorithm that threatens to reveal their critical observation results to hackers all around the world.<\/p>\n<p>In our opinion the scenarios presented in these books are very realistic as the NSA-affair and Wikileaks show. Also services like Facebook, Google and Amazon track, analyse and profile their users on a daily basis in order to monetize their information through advertisements. With the future adoption of technologies like smart glasses, smart wearables and ubiquitous computing the privacy of data will become an even bigger concern.<\/p>\n<p>As an example for the topic of <i>Hacktivism<\/i> in fiction we examined the movie Who am I by Baran bo Odar from 2014. It follows a group of hackers in Germany which seek recognition by the public and compete with other hackers. Although the movie exaggerates with a few stereotypes regarding the lonely and socially awkward hacker, it gets the gist right when it comes to organised groups who pursue illegal activities in the internet just because they can. Hacktivism is a global phenomenon as the collective Anonymous or other groups show. They attack governments or organisations which, as they see it, violate their morals and they seek attention from the public. Another example would be the Arab Spring, where individuals formed a huge community and started protests all organised through social networking services.<\/p>\n<p>As to the topic of <i>Cyberwar, <\/i>we looked at War Games from John Bradham (1983), Hackers by Ian Softly (<i>1995<\/i>), Blackout by Marc Elsberg (2013), #pwned by Holger Junker (2015) and Cyber Storm by Matthew Maher (2013).All these books have in common that the critical infrastructure of companies or states is targeted by individuals, hacker groups or other governments. They emphasize the dependence of modern society to technology and show how vulnerable we really are, especially when it comes to the security of Supervisory Control and Data Acquisition (SCADA) Systems. These scenarios seem exaggerated, but during our research we found similar real incidents of governments or groups using technology as a modern way of warfare. The Iranian nuclear program was sabotaged by a malware called <a href=\"http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\">Stuxnet<\/a> in 2010, which caused turbines to spin out of control. Experts assume Stuxnet was created by American and Israeli specialists, although neither governments have confirmed this openly. <a href=\"http:\/\/www.ft.com\/cms\/s\/0\/2ac58a5c-2422-11e6-9d4d-c11776a5124d.html#axzz4EE8Fp3n6\">Big banks<\/a> and companies are attacked daily. In 2015 there was an attack on the power grid of the western <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">Ukraine<\/a>, which led to power outages. It would be naive to believe that governmental defense experts have not evaluated and played through how to digitally attack certain countries. So in our opinion these scenarios hit very close to home and in the future cyber warfare will become even more unexceptional.<\/p>\n<p><b>Conclusion<\/b><\/p>\n<p>After reading through all these stories and comparing them to the reality, we got the same feeling we had after every Secure Systems lecture in this semester: Nothing is safe, the future is dark, everything will be compromised. This of course is an instrument of authors to tell thrilling stories. Most of the described scenarios, especially the ones in regards to the topic of cyber warfare, were quite realistic. Of course not every author gets the details or even the general concepts right &#8211; looking at you <a href=\"https:\/\/www.youtube.com\/watch?v=cWMcSiRcbC8\">CSI:Cyber<\/a>. But the ones that actually have done their research and describe potentially real scenarios serve an important purpose.<\/p>\n<p>This unpleasantness may be exactly the right thing to cultivate an understanding for IT-Security not only amongst a technically accomplished audience but also average society. For example, students of the University of Washington who participated in an IT-Security lecture usually were taught about all the common security scenarios and how to counter attacks. The lecturers had the impression their students would benefit from a broader societal approach, so every student &nbsp;had to pick a technology and write a short story describing the best and worst scenarios they could imagine regarding their technology. It was considered a fun and creative task by the students, which actually helped to put IT-Security in a more general context. This is something we would love to see in our own Secure Systems module, as we believe both students and the associate professor would greatly profit from telling their own stories in the context of IT-Security.<\/p>\n<p>And maybe we should stop believing the government, the secret services and critical infrastructure companies when they tell us that there is nothing to be afraid of. Instead we should start asking questions, as the writers and directors did, such as:<\/p>\n<ul>\n<li>Who supervises the supervisors?<\/li>\n<li>Is national security really more important than the protection of privacy?<\/li>\n<li>How far do we trust those who have the informations about us and our lives?<\/li>\n<li>How do the warfare and criminalism of the future look like?<\/li>\n<li>How can we protect ourselves and protest against cyber attacks?<\/li>\n<li>How much do we rely on our infrastructure? And how do we react if the situation escalates and the basic needs are no longer satisfied?<\/li>\n<li>Can machines really make decisions better than us, even though a mistake can lead to terrible consequences?<\/li>\n<\/ul>\n<p><em>Blogpost by Merle Hiort (mh266) and J\u00f6rg Einfeldt (je051)<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Probably everybody with a background in computer science has already seen a hollywood blockbuster or read a critically acclaimed book which alluded IT-security. It is a popular topic which allows to play with the expectations and fears of the audience. Government agencies are hacked within seconds, security failures happen everywhere, destructive malware infects machines on [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":822,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26,651],"tags":[],"ppma_author":[691],"class_list":["post-813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/IT-Sicherheit-in-FF2.png","jetpack-related-posts":[{"id":25278,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/","url_meta":{"origin":813,"position":0},"title":"The Impact of Quantum Computing on Cybersecurity","author":"Nadine Weber","date":"10. September 2023","format":false,"excerpt":"The future has arrived: Welcome to the second quantum revolution. But what does this mean for Cybersecurity?","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Quantum Computer by IBM on dark background","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":4024,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/","url_meta":{"origin":813,"position":1},"title":"Why AI is a Threat for our Digital Security","author":"Katharina Strecker","date":"22. August 2018","format":false,"excerpt":"Artificial intelligence has a great potential to improve many areas of our lives in the future. But what happens when these AI technologies are used maliciously? Sure, a big topic may be autonomous weapons or so called \u201ckiller robots\u201d. But beside our physical security - what about our digital one?\u2026","rel":"","context":"In &quot;Artificial Intelligence&quot;","block_context":{"text":"Artificial Intelligence","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/artificial-intelligence\/"},"img":{"alt_text":"Computer image recognition has beaten human-level image recognition in 2015","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":26307,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/","url_meta":{"origin":813,"position":2},"title":"Importance and Impact of Quantum Safe Encryption for Enterprises","author":"Aleksandra Gidionova","date":"26. July 2024","format":false,"excerpt":"More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published\u00a0[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding\u00a0field at the forefront of technological innovation. With the potential to revolutionize computing power and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1017,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/25\/machine-learning-in-secure-systems\/","url_meta":{"origin":813,"position":3},"title":"Machine Learning in secure systems","author":"Claudius Messerschmidt","date":"25. July 2016","format":false,"excerpt":"Sadly today's security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a \"rule set\" to detect and prevent any attack. This \u201canalyst-driven solutions\u201d are build up from human experts with their domain knowledge. This knowledge is based on experiences and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10555,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/iot-security-the-current-situation-best-practices-and-how-these-should-be-applied\/","url_meta":{"origin":813,"position":4},"title":"IoT security \u2013 The current situation, \u201cbest practices\u201d and how these should be applied","author":"lh133","date":"19. August 2020","format":false,"excerpt":"Smart thermostats, lamps, sockets, and many other devices are no longer part of any futuristic movies. These items can be found in most households, at least in parts, whether in Europe, America, or Asia. A trend that affects the entire globe and is currently gaining ground, especially in industrialized countries.\u2026","rel":"","context":"In &quot;Internet of Things&quot;","block_context":{"text":"Internet of Things","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/internet-of-things\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3221,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/","url_meta":{"origin":813,"position":5},"title":"Security in a SaaS startup and today&#8217;s security issues with DevOps","author":"cp054","date":"25. March 2018","format":false,"excerpt":"Motivation Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":691,"user_id":11,"is_guest":0,"slug":"je051","display_name":"J\u00f6rg Einfeldt","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/a9c90222aff9d0c74c3c5634b74ead017644b533154f1f72047c3cdb73c3dbe2?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=813"}],"version-history":[{"count":8,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/813\/revisions"}],"predecessor-version":[{"id":24682,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/813\/revisions\/24682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/822"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=813"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}