Cybercrime, privacy and security concepts in the film WarGames - Essay Example

Only on StudentShare

Extract of sample
Cybercrime, privacy and security concepts in the film WarGames

Therefore, he takes his time to engage in cybercrimes and hacking of computer security codes in search of games to play (Bischoff, 1983). His hacking practice eventually leads him to a US supercomputer that is highly secured, due to the sensitive nature of the information it contains. This information is potentially dangerous and capable of causing world destruction through sparking World War III, which is a war of nuclear weapons. The super computer was programmed to launch missile attacks automatically, on the event of being ordered to start such an action, after the Air Force Strategic missile operatives were unwilling to turn on the button which could spark off the nuclear missile attacks (Franklin, 2008). Considering that none of the operatives wanted to be the cause of the devastating attack that could wipe out the whole world, a super computer had to be programmed, which could easily be turned into action by a simple computer operation procedure. Therefore, initially perceiving the WOPR (War Operation Plan Response) program as another exciting game, David Lightman, (Broderick) embarks on a mission to unearth the backdoor password that can be used to hack into, and access the Supercomputer details (Bischoff, 1983). ...
Download paper

Summary

Cybercrime, privacy and security concepts in the film WarGames (1983)
The film, WarGames (1983), is a film narrating a fictional story of a young computer wizard, who is very intelligent and still in high school, but appears to be unmotivated. …
Author : allie66

Related Essays

Interpersonal Communcation Concepts
To accomplish this task, I decided to take a complete interview of Mr. _____, who is the marketing manager at Blue Moon Advertising Company, in order to know how he makes use of different interpersonal concepts to carry out his job responsibilities. The communication concepts that we discussed included identity management, perception checking, and nonverbal communication. I chose Mr. _____ as my interviewee because he is at the position at which I also want to be in future. In this essay, I will describe how the three interpersonal communication concepts that I discussed with my interviewee...
3 pages (753 words) Essay
Privacy in the 21st century
Without obtaining any warrants from the Foreign Intelligence Surveillance Court (FISC). It is extremely unfortunate that the government we entrust to uphold and protect citizen rights is the one denying citizens their rights to privacy. According to Liu (2011), the National Security Agency (NSA), listens to telephone conversation of people suspected of terrorism. This is truly offending since phone calls are highly private and sometimes contains information that might be sensitive to the communicating parties. For example, if one is having a private conversation over the phone with a person...
3 pages (753 words) Assignment
Film Review
Plot The film ultimately narrates the production of Meet Pamela, a passe melodrama that stars Jean-Piere Aumon who is the aging movie icon, Valentina Cortese, Jean-Pierre Leaud and Jacqueline Bisset who is a British actor. It is evident from the film that Jacqueline Bisset who plays as Julie Baker in film, is recovering a nervous collapse as well as the controversy that leads her to marry the doctor who is much older. In between the film, there are various small vignettes. They include chronicle of the crewmembers stories and Truffaut who is the director of the film, faces with the numerous...
3 pages (753 words) Essay
Communication Privacy Management
A friend of a friend of mine, Lisa, told my friend Anne and me that she discovered that her mother, Margie, was having an affair with a school employee, John (unmarried). The names here are all made up for privacy reasons. The news made me significantly uncomfortable because the woman was, in effect, committing bigamy, and I did not want to be a part of it. CPMT helps me understand this life experience and how it should have been resolved. Petronio offers five principles of CPMT, the first is that people think they own and have a right to control their private information. Private information...
4 pages (1004 words) Essay
Media and Privacy
In this case the rampager was merely a 15 year old boy named Jeffrey who unleashed violence in his school campus. Normally crimes like these, which are conducted with no concrete reason behind them, reflect a flaw which prevails in our societies. It manifests that fact that certain immoralities are embedded within our societies, whose affect is so grave that it becomes a source of motivation for a perpetrator to indulge in senseless and shocking crimes. Apparently, the killers in such cases seem normal and quiet blended in the crowd. Generally, they do not hold any prior criminal records; but...
7 pages (1757 words) PowerPoint Presentation
The End of Privacy
The authorities have been involved in securing and establishing policies to minimize incremental advantages from such information. However, the ambivalence one experiences due to advance technology is quite right. Such technological tools do advent human kind, but they are also a main reason to erode personal privacy (Tavani, 162). Surveillance cameras, sensors, recording devices, monitors have the capability to store large amount of data. These day to day technological tools may seem inevitable due to the ease and security they have produced for the mankind, but they have also posed a threat...
6 pages (1506 words) Research Paper
Media and Privacy
It is not ethical to invade people’s privacy and it should always be paramount to protect their image (Karen 21). When dealing with cases where the person is in the public place, they expect to have their privacy protected from the public. However, they have to respect privacy but at the same time be robust about their investigation. Journalist should not disclose publicly any private, irrelevant and embarrassing facts about people. Misappropriating a person’s name and image for personal gain is also unethical. Intruding into a person’s solitude and exposing them to the public is against...
4 pages (1004 words) Assignment
Got a tricky question? Receive an answer from students like you! Try us!