hacking in popular culture
play

Hacking in Popular Culture Week 2 Frank Chen | Spring 2017 Agenda - PowerPoint PPT Presentation

Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker CS 88S Hacking in Popular Culture Week 2 Frank Chen | Spring 2017 Agenda Administrative Review last weeks material Hack Hollywood Hacking: The Good, The


  1. Mr. Robot, an Emmy Award-winning TV drama starring a vigilante hacker CS 88S Hacking in Popular Culture Week 2 Frank Chen | Spring 2017

  2. Agenda ● Administrative ● Review last week’s material ● Hack ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  3. Agenda ● Administrative ● Review last week’s material ● Hack ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  4. Power of the Internet Frank Chen | Spring 2017

  5. Power of the Internet Frank Chen | Spring 2017

  6. Power of the Internet Frank Chen | Spring 2017

  7. Power of the Internet http://bit.ly/2okf8vS Frank Chen | Spring 2017

  8. Power of the Internet Frank Chen | Spring 2017

  9. Power of the Internet Frank Chen | Spring 2017

  10. Agenda ● Administrative ● Review last week’s material ● Hack ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  11. Computers Computers deal with data . Computers are deterministic Frank Chen | Spring 2017

  12. Internet Internet brings everyone together. Internet is nondeterministic . Frank Chen | Spring 2017

  13. CIA Principle C Confidentiality I Integrity A Accessibility Frank Chen | Spring 2017

  14. Agenda ● Review last week’s material ● Hack ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  15. Hack Frank Chen | Spring 2017

  16. Hack? Def: Maliciously taking advantage of a system's CIA paradigms Frank Chen | Spring 2017

  17. Hack? Def: A slang for innovatively solving a problem or making a product. Frank Chen | Spring 2017

  18. Hackathon? Def: Programming competitions where students are encouraged to build anything they’d like. From websites to apps to hardware products etc. Frank Chen | Spring 2017

  19. Implicit Bias Def: Bias in judgment and/or behavior that results from subtle cognitive processes (e.g., implicit attitudes and implicit stereotypes) that often operate at a level below conscious awareness and without intentional control. UCLA Vice Chancellor Jerry Kang's TED talk video: http://bit.ly/2oaM8Ek Frank Chen | Spring 2017

  20. Implicit Bias # 1 # 2 # 3 SLB CFLTK CFLTK SPRND HLMG CFLTK SLB SPRND SLB SPRND HLMG CFLTK *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  21. Implicit Bias # 1 # 2 # 3 GREEN BLUE GREEN RED YELLOW YELLOW PURPLE BLUE RED GREEN RED PURPLE *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  22. Implicit Bias # 1 # 2 # 3 RED GREEN YELLOW BLUE GREEN BROWN RED YELLOW BLUE BROWN BROWN BLUE *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  23. Implicit Association Test Invented by A. G. Greenwald Programming LEFT RIGHT *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  24. Implicit Association Test Invented by A. G. Greenwald Hack LEFT RIGHT *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  25. Implicit Association Test Invented by safe A. G. Greenwald knowledgeable protect smart LEFT RIGHT *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  26. Implicit Association Test Invented by danger A. G. Greenwald ominous malicious sly LEFT RIGHT *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  27. Implicit Association Test Invented by A. G. Greenwald Programming Hack Programming Hack safe danger knowledgeable ominous protect malicious smart sly *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  28. Implicit Association Effect Invented by A. G. Greenwald 213 ms Δ Average Latency is a measure of your bias! *Numbers not accurate; visual purpose only *Slide credits to Vice Chancellor Jerry Kang Frank Chen | Spring 2017

  29. Hack? Frank Chen | Spring 2017

  30. Agenda ● Review last week’s material ● Hacked, Hack, Hackathon ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  31. Misrepresentation Frank Chen | Spring 2017

  32. The Ugly: 90s Computer Hacking Supercut http://bit.ly/2nYSt8T Frank Chen | Spring 2017

  33. What was ugly about that? ● Cheesy lines ● Horrible/Unrealistic CGI ● Black box hacking process ● Poor plot-driving method Frank Chen | Spring 2017

  34. The Bad: Skyfall http://bit.ly/2o35e2z Frank Chen | Spring 2017

  35. What was bad about that? ● Elaborate Graphical Interface ● "What if you try this" cliche ● Unrealistic decryption ● "They hacked us" cliche Frank Chen | Spring 2017

  36. The Good http://bit.ly/2kONbHi Frank Chen | Spring 2017

  37. What was good about that? ● Clear explanation of vulnerability ● Clear motivation for hacking ● Realistic props and computer screens Frank Chen | Spring 2017

  38. vs Simple Dialogue Complex Back-and-forth Real computer interface Futuristic machine Current-world Fiction Frank Chen | Spring 2017

  39. [case] Hospital Hacking 3.6 million in BitCoins ● "The fact that hackers were able to ● encrypt patient records doesn’t necessarily mean they gained access to those files, but the goal of this type of cyberattack isn’t to get to patient information; it’s to make sure that the hospital can’t get to it, either" Known as ransomware ● http://theatln.tc/2ntCdvp Frank Chen | Spring 2017

  40. Even Worse? http://bit.ly/2ciVElN Frank Chen | Spring 2017

  41. Even Worse? ● loading GUI? ● start counterstrike? ● cats? ● "you are good but I am better" ● blinky boxes? ● cyber-nukes?? Frank Chen | Spring 2017

  42. Agenda ● Review last week’s material ● Hacked, Hack, Hackathon ● Hollywood Hacking: The Good, The Bad, & The Ugly ● Can we do better? Frank Chen | Spring 2017

  43. Visualizing DDoS http://bit.ly/2orlnei Frank Chen | Spring 2017

  44. S�f��� �� ��� C���� T�� Your laptop + phone should be locked by password Frank Chen | Spring 2017

  45. Ray-bans phishing scam on Facebook Next Week... Frank Chen | Spring 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend