Nobody downloaded yet

Cybercrime, privacy and security concepts in the film WarGames - Essay Example

Comments (0) Cite this document
Summary
Cybercrime, privacy and security concepts in the film WarGames (1983)
The film, WarGames (1983), is a film narrating a fictional story of a young computer wizard, who is very intelligent and still in high school, but appears to be unmotivated. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Cybercrime, privacy and security concepts in the film WarGames
Read TextPreview

Extract of sample "Cybercrime, privacy and security concepts in the film WarGames"

Download file to see previous pages Therefore, he takes his time to engage in cybercrimes and hacking of computer security codes in search of games to play (Bischoff, 1983). His hacking practice eventually leads him to a US supercomputer that is highly secured, due to the sensitive nature of the information it contains. This information is potentially dangerous and capable of causing world destruction through sparking World War III, which is a war of nuclear weapons. The super computer was programmed to launch missile attacks automatically, on the event of being ordered to start such an action, after the Air Force Strategic missile operatives were unwilling to turn on the button which could spark off the nuclear missile attacks (Franklin, 2008). Considering that none of the operatives wanted to be the cause of the devastating attack that could wipe out the whole world, a super computer had to be programmed, which could easily be turned into action by a simple computer operation procedure. Therefore, initially perceiving the WOPR (War Operation Plan Response) program as another exciting game, David Lightman, (Broderick) embarks on a mission to unearth the backdoor password that can be used to hack into, and access the Supercomputer details (Bischoff, 1983). Being a computer whizz, and with the help of his friend who were also hackers, Broderick eventually manages to unearth the backdoor password and starts operating the computer program by running the nuclear war simulation, through his own computer (Franklin, 2008). Considering the threat posed by this computer operation, the simulation scares the whole security and military departments, since it almost causes a full blown World War III, which is a devastating war of nuclear missiles. This cyber crime and security intrusion into the US military department security systems is a form of black hat hacking. This is because, black hat hacking entails the process of violating and cracking computer security systems with malicious intentions of benefiting oneself (Hanser, 2011). Broderick had been hacking other computer security systems previously, to gain access to computer games that he could play. In the process of searching for more interesting computer games, other than chess, poker and checkers which he had previously accessed, he embarked on searching for new games, which led him to the supercomputer, which seemed to possess a different nature of games than he had been used to (Bischoff, 1983). This practice of hacking into other computer security systems and accessing games to play, instead of purchasing such games from the manufacturers or retailers, is a selfish crime. Additionally, hacking into other security systems without the knowledge of the owners of the systems, regardless of the intentions an individual has, is malicious and damaging (Johnston, 2011). Therefore, this act of Broderick hacking and accessing the security systems of the US supercomputer and his continuation to simulate the war programs is a form of black hat hacking, since it involves the violation of computer security and privacy laws (Subramanian, 2008). The fictional narration of this film falls under the following three categories: Cybercrime Cybercrime refers to any act of an individual to use computers or computer networks for crime. This can occur in the form of using the computer to commit crime or targeting other computers with some criminal intentions (Hanser, 2011).The film WarGames (1983), depicts both forms of crime. There is a crime of using computers to commit a violation of the acceptable computer privacy and security guidelines. Here, Broderick, who is a bright but highly unmotivated teenager, engages in the act of using ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybercrime, privacy and security concepts in the film WarGames Essay”, n.d.)
Cybercrime, privacy and security concepts in the film WarGames Essay. Retrieved from https://studentshare.org/journalism-communication/1462400-argumentative-essay
(Cybercrime, Privacy and Security Concepts in the Film WarGames Essay)
Cybercrime, Privacy and Security Concepts in the Film WarGames Essay. https://studentshare.org/journalism-communication/1462400-argumentative-essay.
“Cybercrime, Privacy and Security Concepts in the Film WarGames Essay”, n.d. https://studentshare.org/journalism-communication/1462400-argumentative-essay.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cybercrime, privacy and security concepts in the film WarGames

Cybercrime and Privacy

...or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations’ security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy. The proliferation of technology and internet based activities ranging from personal banking and social networking activities to shopping online and searching for employment has become common place, and hence increased the vulnerability of individuals to cyber attacks. The personal details shared by...
9 Pages(2250 words)Research Paper

Cybercrime

...and prosecute cases against “any private entity's failure to provide 'appropriate' information security,”40 which has led to successful prosecutions and consent decrees with companies who suffer security breaches.41 It has also established a special division to deal with the problem, the Division of Privacy and Identity Protection, which “enhance[s] consumer outreach and enforcement.”42 Even so, it is largely ineffective due to lack of resources and manpower, as it was only able to prosecute six data breach cases out of hundreds that occurred between February 2005 and September 2006.43 One way of addressing the problem in the United States is by propertizing one's personal data. In an...
18 Pages(4500 words)Essay

Privacy & Security

...? E-Commerce Data Privacy & Security Table of Contents …….………………………………….Page 5 Introduction …….………………………………...Page 5 1 What is Security? ..…………………………………….. Page 6 1.2 Why Security is important? ..…………………………………….. Page 6 1.3 Who is Vulnerable? ……………………………………….. Page 7 2 Data Privacy in E commerce ………………………………………..Page 8 2.1 Security Seals .……………………………………Page 8 2.1.1 Truste .………………………………………Page 8 2.1.2 Web Trust .………………………………………Page 9 2.1.3 BBB Online ………………………………………..Page 10 3 Literature Review ……………………………………….. Page 10 3.1 Consumer Privacy ……………………………………….. Page 11 3.2 Security Perceptions of e-Commerce...
26 Pages(6500 words)Essay

Data Privacy and Security

... Data Privacy and Security Introduction The role of computer systems is very vital in our daily lives. Since these computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless. In this prospect, many people control their routine lives by means of their personal computers. However, at the present computer security has become a very critical issue. Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer. In this scenario, some preventive measures enable us to...
8 Pages(1750 words)Research Paper

Biometric Security and Privacy

...up security measures at airports, railway stations, important offices, tourist destinations etc. measures like Radio frequency identification (RFID) tagging is used to monitor the movement of goods, vehicles and the workforce. In some ways these measures result in loss of privacy for the common people. This study is an attempt to analyse some of the arguments for and against these measures, while also taking a look at the prevailing circumstances and the advancements in technology. Research Questions and Objectives The study is primarily being undertaken to understand the concept of biometric security in general and the extent to which these measures have helped in...
15 Pages(3750 words)Essay

Information Security and Privacy

...Information Security and Privacy/Legal Concerns Introduction Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet. Despite the security problems the internet posses, businesses need to be connected to be able to compete as the use f the internet offer many advantages such as internet mail, file transfers and homepages for business. As organizations need to be connected to the internet, protection and security is required to prevent unauthorised users from...
6 Pages(1500 words)Essay

WarGames

...is imminent. Although WarGames is mostly considered a juvenile sci-fi adventure today, it was taken very seriously at the time of its release, thanks to the prevailing fear of nuclear war, in addition to the vast majority of the public not knowing of how such things as modems and computer actually work. The weightiness of some very real issues led to it earning three Academy Award nominations, including Best Writing for the screenplay by Lasker and Parkes (they would revisit the hacker theme in a future film, Sneakers). Some aspects admittedly dated, WarGames still manages to be a riveting and intelligent thriller, with some terrific performances from a cast of very appealing actors. ...
2 Pages(500 words)Essay

Security versus privacy

...20 February Security versus Privacy Introduction September 11 attacks showed us the power of terror activities and the magnitude of damage it can do to our society. The event changed our priorities of security and as a result we see security centric policies. Varity of small arms and weapon components are available for concealed carry which poses a challenge to maintain security and detect threats. As a result individuals need to be checked thoroughly to detect even smallest of components that can be used in terror or sabotage activities. This requirement links security and privacy since we cannot leave individuals...
6 Pages(1500 words)Essay

Cybercrime

...and location within a shorter tenure. Besides, it is also important for the FBI agents to ensure the implementation of the latest and advanced techniques for emphatic execution of the law enforcement capabilities. It is necessary for FBI agents while working in the environment, which has no boarders and endures multiple laws to ensure effective jurisdiction. Implementation of the information security regulations is another step to mitigate the challenges associated with cybercrime law. Cybercrime can also be combatted by ensuring awareness within the societal context. These concerned steps are applied to enhance the legal securities and regulations with regard to...
5 Pages(1250 words)Essay

Cybercrime

.... Traditional law agencies can also conduct civic education to people advising them on the best measures to prevent cyber crimes such as protecting their privacy, passwords and use of antivirus to stop spam and viruses (Kiesbye 2012). The rate of cybercrime has integrated into theft of identity. Identity theft has increased tremendously as a white collar crime on a global basis. It has become like a highly infectious disease spread through technological development. Identity theft refers to identity fraud where criminals use someone else’s identity for their own illegal purposes Hile 2010). The common way that people’s identity are stolen is through credit card theft. Criminals then use the credit cards...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cybercrime, privacy and security concepts in the film WarGames for FREE!

Contact Us