Thursday, June 13, 2019

Cybercrime, privacy and security concepts in the film WarGames Essay

Cybercrime, privacy and certification concepts in the film WarGames - Essay ExampleTherefore, he takes his time to get hold of in cybercrimes and hacking of ready reckoner security codes in search of games to play (Bischoff, 1983). His hacking practice eventually leads him to a US super electronic computer that is highly secured, due to the sensitive nature of the teaching it contains. This information is potentially dangerous and capable of causing world destruction through sparking World War III, which is a war of nuclear weapons. The super computer was programmed to launch missile attacks automatically, on the event of being ordered to start such an action, after the Air Force Strategic missile operatives were unwilling to unblock on the button which could spark off the nuclear missile attacks (Franklin, 2008). Considering that none of the operatives wanted to be the cause of the devastating attack that could wipe out the entire world, a super computer had to be programmed, which could easily be turned into action by a simple computer operation procedure. Therefore, initially perceiving the WOPR (War mathematical process Plan Response) program as another exciting game, David Lightman, (Broderick) embarks on a mission to unearth the backdoor password that can be used to hack into, and accession the Supercomputer details (Bischoff, 1983). Being a computer whizz, and with the help of his friend who were also hackers, Broderick eventually manages to unearth the backdoor password and starts operating the computer program by rill the nuclear war simulation, through his own computer (Franklin, 2008). Considering the threat posed by this computer operation, the simulation scares the whole security and military departments, since it almost causes a full blown World War III, which is a devastating war of nuclear missiles. This cyber crime and security intrusion into the US military department security systems is a form of black hat hacking. This is because, b lack hat hacking entails the process of violating and cracking computer security systems with malicious intentions of benefiting oneself (Hanser, 2011). Broderick had been hacking other computer security systems previously, to piss access to computer games that he could play. In the process of searching for more interesting computer games, other than chess, poker and checkers which he had previously accessed, he embarked on searching for new games, which led him to the supercomputer, which seemed to possess a different nature of games than he had been used to (Bischoff, 1983). This practice of hacking into other computer security systems and accessing games to play, kind of of purchasing such games from the manufacturers or retailers, is a selfish crime. Additionally, hacking into other security systems without the knowledge of the owners of the systems, regardless of the intentions an individual has, is malicious and damaging (Johnston, 2011). Therefore, this act of Broderick hac king and accessing the security systems of the US supercomputer and his continuation to simulate the war programs is a form of black hat hacking, since it involves the misdemeanor of computer security and privacy laws (Subramanian, 2008). The fictional narration of this film go under the following three categories Cybercrime Cybercrime refers to any act of an individual to use computers or computer networks for crime. This can occur in the form of using the computer to commit crime or targeting other computers with some criminal intentions (Hanser, 2011).The film WarGames (1983), depicts both forms of crime. There is a crime of using computers to commit a violation of the acceptable computer privacy and security guidelines. Here, Broderick, who is a bright but highly unmotivated teenager, engages in the act of using

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.