1
MOVIE ANALYSIS:
SWORDFISH (2001)
2
SUMMARY 3
SWORDFISH (2001) IS AN ACTION-THRILLER FILM
DIRECTED BY DOMINIC SENA. THE STORY
FOLLOWS GABRIEL SHEAR (JOHN TRAVOLTA), THE
LEADER OF A COVERT COUNTER-TERRORIST UNIT
CALLED BLACK CELL, AS HE ATTEMPTS TO STEAL
BILLIONS OF DOLLARS FROM A SECRET
GOVERNMENT SLUSH FUND. TO DO THIS, HE
RECRUITS STANLEY JOBSON (HUGH JACKMAN), A
SKILLED HACKER WHO HAS BEEN BANNED FROM
USING COMPUTERS DUE TO PAST CRIMES.
SHEAR'S PLAN INVOLVES HACKING INTO
GOVERNMENT FILES TO ACCESS THE FUNDS, BUT
AS THE OPERATION UNFOLDS, JOBSON BECOMES
HACKING SCENES 4
BRUTE FORCE ATTACKS: RAPID
PASSWORD GUESSING / TIME-
CONSUMING AND COMPLEX
HYDRA WORM: MULTI-HEADED
MALWARE ATTACKING SYSTEMS
SIMULTANEOUSLY
TROJAN HORSE: DISGUISED
MALICIOUS SOFTWARE
SOCIAL ENGINEERING:
PSYCHOLOGICAL MANIPULATION
MAN-IN-THE-MIDDLE ATTACK:
KEY MITIGATION STRATEGIES 5
USE STRONG PASSWORDS: ENCOURAGE MULTI-
FACTOR AUTHENTICATION (MFA) AND
PASSWORD MANAGERS.
PATCH MANAGEMENT: REGULARLY UPDATE
SOFTWARE TO FIX VULNERABILITIES.
ANTI-MALWARE TOOLS: DEPLOY AND
MAINTAIN ANTI-VIRUS AND ANTI-MALWARE
SOFTWARE.
EMPLOYEE TRAINING: EDUCATE EMPLOYEES ON
PHISHING AND SOCIAL ENGINEERING TACTICS.
NETWORK SECURITY: USE ENCRYPTION, SECURE
PROTOCOLS, AND FIREWALLS TO PROTECT DATA
IN TRANSIT.
REALISTIC CYBER-ATTACKS 6
KEY EXAMPLES:
SOLARWINDS HACK: A
SOPHISTICATED SUPPLY
CHAIN ATTACK
WANNACRY
RANSOMWARE: GLOBAL
RANSOMWARE ATTACK
USING A WORM
ZERO-DAY EXPLOITS:
TARGETING UNKNOWN
VULNERABILITIES
CONCLUSION 7
• SWORDFISH PRESENTS A
HIGHLY STYLIZED AND
UNREALISTIC VIEW OF
HACKING
• REAL-WORLD HACKING
INVOLVES TIME,
PATIENCE, AND A
COMBINATION OF
METHODS
• UNDERSTANDING REAL-
WORLD TECHNIQUES
AND IMPLEMENTING
8
THANK YOU
AND
GOD BLESS!

MOVIE REVIEW: SWORDFISH (2001) HACKING STRATEGIES

  • 1.
  • 2.
  • 3.
    SUMMARY 3 SWORDFISH (2001)IS AN ACTION-THRILLER FILM DIRECTED BY DOMINIC SENA. THE STORY FOLLOWS GABRIEL SHEAR (JOHN TRAVOLTA), THE LEADER OF A COVERT COUNTER-TERRORIST UNIT CALLED BLACK CELL, AS HE ATTEMPTS TO STEAL BILLIONS OF DOLLARS FROM A SECRET GOVERNMENT SLUSH FUND. TO DO THIS, HE RECRUITS STANLEY JOBSON (HUGH JACKMAN), A SKILLED HACKER WHO HAS BEEN BANNED FROM USING COMPUTERS DUE TO PAST CRIMES. SHEAR'S PLAN INVOLVES HACKING INTO GOVERNMENT FILES TO ACCESS THE FUNDS, BUT AS THE OPERATION UNFOLDS, JOBSON BECOMES
  • 4.
    HACKING SCENES 4 BRUTEFORCE ATTACKS: RAPID PASSWORD GUESSING / TIME- CONSUMING AND COMPLEX HYDRA WORM: MULTI-HEADED MALWARE ATTACKING SYSTEMS SIMULTANEOUSLY TROJAN HORSE: DISGUISED MALICIOUS SOFTWARE SOCIAL ENGINEERING: PSYCHOLOGICAL MANIPULATION MAN-IN-THE-MIDDLE ATTACK:
  • 5.
    KEY MITIGATION STRATEGIES5 USE STRONG PASSWORDS: ENCOURAGE MULTI- FACTOR AUTHENTICATION (MFA) AND PASSWORD MANAGERS. PATCH MANAGEMENT: REGULARLY UPDATE SOFTWARE TO FIX VULNERABILITIES. ANTI-MALWARE TOOLS: DEPLOY AND MAINTAIN ANTI-VIRUS AND ANTI-MALWARE SOFTWARE. EMPLOYEE TRAINING: EDUCATE EMPLOYEES ON PHISHING AND SOCIAL ENGINEERING TACTICS. NETWORK SECURITY: USE ENCRYPTION, SECURE PROTOCOLS, AND FIREWALLS TO PROTECT DATA IN TRANSIT.
  • 6.
    REALISTIC CYBER-ATTACKS 6 KEYEXAMPLES: SOLARWINDS HACK: A SOPHISTICATED SUPPLY CHAIN ATTACK WANNACRY RANSOMWARE: GLOBAL RANSOMWARE ATTACK USING A WORM ZERO-DAY EXPLOITS: TARGETING UNKNOWN VULNERABILITIES
  • 7.
    CONCLUSION 7 • SWORDFISHPRESENTS A HIGHLY STYLIZED AND UNREALISTIC VIEW OF HACKING • REAL-WORLD HACKING INVOLVES TIME, PATIENCE, AND A COMBINATION OF METHODS • UNDERSTANDING REAL- WORLD TECHNIQUES AND IMPLEMENTING
  • 8.