Defining Computer and Network Security
Network security relates to the set of rules designed to protect the confidentiality, integrity, and accessibility of data [1]. While there are no scenes that directly correspond to the concepts of computer or network security with respect to hacking, malware, or cyber crime, a few analogies can be made connecting the movie to this course topic.
Airport Security
A security breach occurs when an organization's policies or procedures are compromised [2]. As mentioned in more detail in the previous section, one scene shows the main character Ben smuggling money through an airport metal detector. This action, which intentionally circumvents the regulations set in place for the public's protections, can be considered a breach. While this breach is not specifically related to computer or network security, an analogy can be drawn between this physical example and that of a backdoor. In the field of cybersecurity, a backdoor is a method by which unauthorized (or authorized) users are able to bypass normal security measures, similar to how Ben was able to bypass detection [3].
Image Credits: 21 (2008)
Card Counting
Hacking can be defined as compiling information in a way that is useful or advantageous [4]. An analogy that can be drawn in relation to the movie and the concepts of network and computer security is one between card counting and hacking. Not only is card counting against casino policy, but it exploits patterns and aspects of the game in a similar fashion to how hackers exploit features of network infrastructure in order to gain access to a system. While card counting does not involve any technology and is founded on basic mathematical principles, the ability to collect and utilize information in a manner than contradicts casino policy can be considered on par with hacking.
Image Credits: 21 (2008)
Database Security
A final connection that can be made between the movie and this course topic is related to the facial recognition software that is utilized throughout the film (see Computing Technologies section for specifics). This software, which stores the information it collects in a database creates an enormous computer security threat to casino owners. These databases store a significant amount of information about the casino's clients and like any network based software, are susceptible to hacking which could have potentially drastic consequences for affected parties (see Information Privacy section re: identity theft). Not only could sensitive information be released about countless individuals, but these databases could also be used for personal attacks and breached to target specific individuals.
[3] Backdoor, (National Institute of Standards and Technology), https://csrc.nist.gov/glossary/term/backdoor. Accessed 25 April 2021.
[4] Hacking, (Britannica) https://www.britannica.com/technology/hacking-computing. Accessed 25 April 2021.