<i>The Matrix</i> at 20: A Metaphor for Today's Cybersecurity Challenges
<i>The Matrix</i> ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.
It's difficult to believe that The Matrix celebrated its 20th anniversary in March. It's equally hard to ignore how well the film has stood the test of time. With Oscar-winning innovations in stunt work and special effects such as "bullet time," the sci-fi epic starring Keanu Reeves and Laurence Fishburne changed Hollywood, according to some film critics.
At least, I think so.
It's not just the special effects and plot development that remain fresh. What's relevant for security professionals is the similarities between the characters and plot and how we look at modern security practices and technology.
The film's protagonist — the computer programmer Mr. Anderson, played by Reeves — is one of billions of humans unwittingly inhabiting a simulated reality, referred to as the "Matrix." Through a process of self-realization and literal rebirth, he becomes the hero, Neo. The process has been triggered by his choice of swallowing a "red pill" of reality instead of the "blue pill" that will keep him ignorantly complacent in a contrived, alternative, and manipulative world.
Neo is analogous to present-day CISOs: security professionals who have taken the "red pill" and are awake to the reality of protecting a real-life business amid the frightening, shape-shifting threats from cybercriminals seeking to do harm. In The Matrix, this ever-present evil is determined to destroy Zion, the last human-inhabited city in the world.
How Neo Battled the 'Advanced Persistent Threat'
Shape-shifting is core to the movie's plot. "Agents," Neo's sinister enemies, take over the bodies of innocent bystanders in their relentless pursuit of Neo and his crew. The cybersecurity analogy here is an advanced persistent threat (APT) group utilizing stolen credentials to gain a foothold into an organization — one of the most pernicious elements facing today's enterprise.
Modern breaches often involve malicious APT-like agents gaining access to an employee's credentials in order to achieve their goal. This usually happens as a result of spearphishing attempts, enabling attackers to steal customer data, intellectual property, or financial and banking data.
Just as Neo stays vigilant in looking for constant threats, CISOs fight the epidemic of stolen credentials with proactive risk-based authentication techniques that stop attackers from even obtaining a foothold in the first place. The key in both situations is having visibility into attacker behavior.
The Battle Against Insider Threats, Matrix-style
As Neo begins his journey to the "real world," a jaded crew member, Cypher (Joe Pantoliano), asks, "Why, oh why, didn't I take the blue pill?" This was Cypher's rhetorical regret for not choosing to accept an easy, stress-free life in the Matrix rather than remaining in his real-world existence. Cypher's words actually foreshadow his true intentions when it's revealed he has sold out the crew on their ship, the Nebuchadnezzar, to the Agents in order to be "reborn" as a rich celebrity in the Matrix — without any memory of his past life.
Cypher represents an insider threat, trading the whereabouts of his crew for his own gain. In cybersecurity terms, insider threats are often embodied by employees, temporary workers, or contractors who have access to an organization's systems. Insider threats may either act alone or consort with the enemy. Tank — a computer operator comparable to a real-world security analyst — eventually kills Cypher. The security analyst defeats the insider threat.
For cybersecurity professionals, insider threats continue to plague organizations of all sizes. Consider these statistics:
The average annual cost of an insider threat to organizations is $8.76 million, according to the Ponemon Institute.
25% of all security incidents involve insider threats, according to the 2017 Verizon Data Breach Investigations report.
Fortunately, malicious insiders who seek to steal data can be neutralized through a robust security program that includes network, endpoint and identity security, and pervasive vulnerability management, and focuses equally on protection, detection, and response.
Battling Cyber Villains Is Our Reality
There are several other parallels between the plot of The Matrix and the cybersecurity world:
Zion can be compared with an organization that needs protection.
The Nebuchadnezzar's control center is analogous to the security operations center (SOC).
Morpheus (Fishburne) is the security-aware CEO who recruits talented information security professionals to his team, ultimately enlisting Neo by offering the red pill (video) to wake him up to "the truth."
Trinity (Carrie-Anne Moss) is the "white hat" hacker friend of Neo who actually uses the Nmap scanning tool to help out her team in the second installment, The Matrix Reloaded.
The ability of The Oracle (Gloria Foster) to understand the human psyche to create a better Matrix could be compared with user and entity behavior analytics, and her ability to see into the future could be compared with the predictive analytics branch of statistical analysis — a fledgling area in cybersecurity.
The Matrix ushered in a new generation of sci-fi movies and brought back complex, futuristic plotlines that featured a relentless, seemingly invulnerable set of villains. Twenty years later, that theme can feel all too real for security professionals.
The facts remain: Bad actors come in all shapes and sizes, deploying new, sophisticated techniques to penetrate enterprises for any number of malicious reasons. As security professionals, we've taken the "red pill," which means we know how pervasive these threats are — and we've chosen to defend Zion against them.
Related Content:
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.
About the Author
You May Also Like