Skip to main content

Explaining Cybersecurity with Films and the Arts

  • Chapter
  • First Online:
Imagine Math 7

Abstract

There are a large number of movies, TV series, novels, short stories, and even plays about cybersecurity and, in particular, about hackers. Some are good, some are so-so, most are frankly quite bad. Some are realistic, most make cybersecurity experts cringe. In this paper, I discuss how a number of basic cybersecurity notions (and even several advanced ones) can be explained with the help of some well-known popular movies and other artworks, and some perhaps less obvious ones. I focus in particular on anonymity, pseudonymity, and authentication, but similar explanations can be given for other security properties, for the algorithms, protocols, and systems that have been developed to achieve such properties, and for the vulnerabilities and attacks that they suffer from.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 49.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. Ariemma, Niente resterà intatto (Introduzione non-convenzionale alla filosofia) (Diogene Edizioni, Rome, 2015)

    Google Scholar 

  2. T. Ariemma, La filosofia spiegata con le serie TV (Mondadori, Milan, 2017)

    Google Scholar 

  3. A. Armando, R. Carbone, L. Compagna, J. Cuéllar, M. Llanos Tobarra, Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google Apps, in Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, October 27, 2008 (ACM Press, New York, 2008), pp. 1–10

    Google Scholar 

  4. A. Armando, W. Arsac, T. Avanesov, M. Barletta, A. Calvi, A. Cappai, R. Carbone, Y. Chevalier, L. Compagna, J. Cuéllar, G. Erzse, S. Frau, M. Minea, S. Mödersheim, D. von Oheimb, G. Pellegrino, S.E. Ponta, M. Rocchetto, M. Rusinowitch, M.T. Dashti, M. Turuani, L. Viganò, The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures, in Tools and Algorithms for the Construction and Analysis of Systems – 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24–April 1, 2012. Proceedings. LNCS, vol. 7214 (Springer, Berlin, 2012), pp. 267–282

    Google Scholar 

  5. J. Blasco, E.A. Quaglia, InfoSec Cinema: Using Films for Information Security Teaching, in 2018 USENIX Workshop on Advances in Security Education, ASE 2018 (USENIX Association, Berkeley, 2018)

    Google Scholar 

  6. J. Cabrera, Da Aristotele a Spielberg. Capire la filosofia attraverso i film (Bruno Mondadori editore, Milan, 2007)

    Google Scholar 

  7. J.E. Champoux, Management: Using Film to Visualize Principles and Practice (South-Western, Cincinnati, 2000)

    Google Scholar 

  8. J.E. Champoux, Organizational Behavior: Using Film to Visualize Principles and Practices (South-Western, Cincinnati, 2000)

    Google Scholar 

  9. D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  10. M. Curtiz (directed by), Casablanca. Screenplay by Julius J. Epstein, Philip G. Epstein and Howard Koch based on the play by Murray Burnett and Joan Alison (1942). https://www.imdb.com/title/tt0034583/

  11. A. Dumas père (avec la collaboration d’Auguste Maquet), Les Trois Mousquetaires (Le Siècle, 1844)

    Google Scholar 

  12. R. Emmerich (directed by), Independence Day. Screenplay by Dean Devlin and Roland Emmerich (1996). https://www.imdb.com/title/tt0116629/

  13. S. Esmail (created by), Mr. Robot, 2015–2019. 4 seasons, 45 episodes. https://www.imdb.com/title/tt4158110/

  14. D. Fincher (directed by), The Girl with the Dragon Tattoo. Screenplay by Steven Zaillian based on the novel by Stieg Larsson (2011). https://www.imdb.com/title/tt1568346/

  15. S. Gordon (directed by), Fortress. Screenplay by Troy Neighbors, Steven Feinberg, David Venable and Terry Curtis Fox (1992). https://www.imdb.com/title/tt0106950/

  16. T. Jones (directed by), Monty Python’s Life of Brian. Screenplay by Graham Chapman, John Cleese, Terry Gilliam, Eric Idle, Terry Jones, Michael Palin (1979). https://www.imdb.com/title/tt0079470/

  17. E. Karafili, M. Cristani, L. Viganò, A formal approach to analyzing cyber-forensics evidence, in Proceedings of ESORICS 2018, Part I. LNCS, vol. 11098 (Springer, Cham, 2018), pp. 281–301

    Google Scholar 

  18. Kerberos: The Network Authentication Protocol (2015). https://web.mit.edu/kerberos/

  19. S. Kubrick (directed by), Spartacus Screenplay by Dalton Trumbo based on the novel by Howard Fast (1960). https://www.imdb.com/title/tt0054331/

  20. A.S. Marcus, S.A. Metzger, R.J. Paxton, J.D. Stoddard (eds.), Teaching History With Film: Strategies for Secondary Social Studies, 2nd edn. (Routledge, New York, 2018)

    Google Scholar 

  21. J. McTiernan (directed by), The Thomas Crown Affair. Screenplay by Leslie Dixon and Kurt Wimmer, story by Alan R. Trustman (1999). https://www.imdb.com/title/tt0155267/

  22. R. Mordacci, Al cinema con il filosofo (Imparare ad amare i film) (Mondadori, Milan, 2015)

    Google Scholar 

  23. R. Mordacci (ed.), Come fare filosofia con i film (Carocci editore, Rome, 2017)

    Google Scholar 

  24. OASIS, Security Assertion Markup Language (SAML) v2.0 (2005). https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security

  25. N.A. Oplev (directed by), The Girl with the Dragon Tattoo. Screenplay by Nikolaj Arcel and Rasmus Heisterberg based on the novel by Stieg Larsson (2009). https://www.imdb.com/title/tt1132620/

  26. A. Pfitzmann, M. Hansen, A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (Version v0.34), August 10 (2010). https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf

  27. Plutarch (Translated by John Dryden), Theseus. The Internet Classics Archive. https://classics.mit.edu/Plutarch/theseus.html

  28. P.A. Robinson (directed by), Sneakers. Screenplay by Phil Alden Robinson, Lawrence Lasker and Walter F. Parkes (1992). https://www.imdb.com/title/tt0105435/

  29. L.C. Rubin (ed.), Mental Illness in Popular Media: Essays on the Representation of Disorders (McFarland & Co, Jefferson, 2012)

    Google Scholar 

  30. W.B. Russell III, The art of teaching social studies with film. Clearing House: J. Educ. Strategies Issues Ideas 85(4), 157–164 (2012)

    Article  Google Scholar 

  31. D. Sena (directed by), Swordfish. Screenplay by Skip Woods (2001). https://www.imdb.com/title/tt0244244/

  32. G. Sidney (directed by), The Three Musketeers. Screenplay by Robert Ardrey based on the novel by Alexandre Dumas père (and Auguste Maquet) (1948). https://www.imdb.com/title/tt0040876/

  33. I. Softley (directed by), Hackers. Screenplay by Rafael Moreu (1995). https://www.imdb.com/title/tt0113243/

  34. Q. Tarantino (directed by), Kill Bill: Vol. 2. Screenplay by Quentin Tarantino (2004). https://www.imdb.com/title/tt0378194/

  35. L. Viganò, The SPaCIoS project: secure provision and consumption in the internet of services, in IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST) (IEEE, Piscataway, 2013), pp. 497–498

    Google Scholar 

  36. L. Viganò, D. Magazzeni, Explainable security, in Proceedings of the 6th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2020), affiliated with Euro S&P 2020, 7 September 2020, Genova, Italy (IEEE, Piscataway, 2020)

    Google Scholar 

  37. P. Weir (directed by), Dead Poets Society. Screenplay by Tom Schulman (1989). https://www.imdb.com/title/tt0097165/

  38. H.G. Wells, The War of the Worlds (William Heinemann, London, 1898)

    Google Scholar 

  39. I. Winkler (directed by), The Net. Screenplay by John Brancato and Michael Ferris (1995). https://www.imdb.com/title/tt0113957/

  40. L. Wiseman (directed by), Live Free or Die Hard. Screenplay by Mark Bomback based on a story by Mark Bomback and David Marconi, on an article by John Carlin and on characters by Roderick Thorp (2007). https://www.imdb.com/title/tt0337978/

Download references

Acknowledgements

This work was supported by the King’s Together Multi and Interdisciplinary Research Scheme, King’s College London, UK.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Viganò .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Viganò, L. (2020). Explaining Cybersecurity with Films and the Arts. In: Emmer, M., Abate, M. (eds) Imagine Math 7. Springer, Cham. https://doi.org/10.1007/978-3-030-42653-8_18

Download citation

Publish with us

Policies and ethics