Editing 2077: Heist
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 8: | Line 8: | ||
==Explanation== | ==Explanation== | ||
− | + | {{incomplete|Created by a SUPPOSED REPAIRMAN. Need some elaboration of what it means to be a minor character (in your own life? or in others). Please mention here why this explanation isn't complete. Do NOT delete this tag too soon.}} | |
+ | In many movies, a heist or other crime is carried out by the criminal(s) posing as some type of repairman or similar, hence these movies are called {{w|Heist film}}s. The criminal then gains access to their target through the disguise. This is a form of social engineering. Due to the prevalence of this trope, [[Cueball]] is concerned whenever somebody comes by to ask for access as he believes the person may be planning a crime, and making him a "minor character." | ||
− | In this case, he is asked to open the server room - ostensibly to allow the fire alarm to be checked. However, gaining physical access to the server allows the criminal to bypass most security features that should prevent unauthorized access to the data (a scenario known as | + | In this case, he is asked to open the server room - ostensibly to allow the fire alarm to be checked. However, gaining physical access to the server allows the criminal to bypass most security features that should prevent unauthorized access to the data (a scenario known as Evil Maid Attack). If the hard disks are not encrypted it is trivial to copy all files - allowing the theft of sensitive information stored on the network. Even if the files are encrypted physical access to the server will allow the attacker to corrupt the system either by installing malware or adding malicious hardware components, which will then allow him to retrieve passwords and/or encryption keys. |
Being aware of these dangers Cueball immediately assumes that he (or his employers) are the target of a heist. | Being aware of these dangers Cueball immediately assumes that he (or his employers) are the target of a heist. | ||
Line 16: | Line 17: | ||
The title text seems to be Cueball's internal monologue trying to calm himself down. He points out to himself that the repairman has both a hat (possibly with a company logo) and a toolbox full of tools, then sarcastically asks himself how a thief could possibly get their hands on such a disguise. | The title text seems to be Cueball's internal monologue trying to calm himself down. He points out to himself that the repairman has both a hat (possibly with a company logo) and a toolbox full of tools, then sarcastically asks himself how a thief could possibly get their hands on such a disguise. | ||
− | This is the second comic in a row to reference | + | This is the second comic in a row to reference movies, this one heist movies the previous one, [[2076: Horror Movies 2]], horror movies. |
==Transcript== | ==Transcript== | ||
Line 31: | Line 32: | ||
[[Category:Comics featuring Cueball]] | [[Category:Comics featuring Cueball]] | ||
− | [[Category:Characters with | + | [[Category:Category:Characters with Hats]] |
− | [[Category:Fiction | + | [[Category:Fiction] |