Cybercrime, privacy and security concepts in the film WarGames

Cybercrime, privacy and security concepts in the film WarGames  Essay example
College
Essay
Journalism & Communication
Pages 6 (1506 words)
Download 0
Cybercrime, privacy and security concepts in the film WarGames (1983)
The film, WarGames (1983), is a film narrating a fictional story of a young computer wizard, who is very intelligent and still in high school, but appears to be unmotivated. …

Introduction

Therefore, he takes his time to engage in cybercrimes and hacking of computer security codes in search of games to play (Bischoff, 1983). His hacking practice eventually leads him to a US supercomputer that is highly secured, due to the sensitive nature of the information it contains. This information is potentially dangerous and capable of causing world destruction through sparking World War III, which is a war of nuclear weapons. The super computer was programmed to launch missile attacks automatically, on the event of being ordered to start such an action, after the Air Force Strategic missile operatives were unwilling to turn on the button which could spark off the nuclear missile attacks (Franklin, 2008). Considering that none of the operatives wanted to be the cause of the devastating attack that could wipe out the whole world, a super computer had to be programmed, which could easily be turned into action by a simple computer operation procedure. Therefore, initially perceiving the WOPR (War Operation Plan Response) program as another exciting game, David Lightman, (Broderick) embarks on a mission to unearth the backdoor password that can be used to hack into, and access the Supercomputer details (Bischoff, 1983). ...
Download paper
Not exactly what you need?

Related papers

Interpersonal Communcation Concepts
To accomplish this task, I decided to take a complete interview of Mr. _____, who is the marketing manager at Blue Moon Advertising Company, in order to know how he makes use of different interpersonal concepts to carry out his job responsibilities. The communication concepts that we discussed included identity management, perception checking, and nonverbal communication. I chose Mr. _____ as my…
Privacy in the 21st century
Without obtaining any warrants from the Foreign Intelligence Surveillance Court (FISC). It is extremely unfortunate that the government we entrust to uphold and protect citizen rights is the one denying citizens their rights to privacy. According to Liu (2011), the National Security Agency (NSA), listens to telephone conversation of people suspected of terrorism. This is truly offending since…
Film Review
Plot The film ultimately narrates the production of Meet Pamela, a passe melodrama that stars Jean-Piere Aumon who is the aging movie icon, Valentina Cortese, Jean-Pierre Leaud and Jacqueline Bisset who is a British actor. It is evident from the film that Jacqueline Bisset who plays as Julie Baker in film, is recovering a nervous collapse as well as the controversy that leads her to marry the…
Communication Privacy Management
A friend of a friend of mine, Lisa, told my friend Anne and me that she discovered that her mother, Margie, was having an affair with a school employee, John (unmarried). The names here are all made up for privacy reasons. The news made me significantly uncomfortable because the woman was, in effect, committing bigamy, and I did not want to be a part of it. CPMT helps me understand this life…
Media and Privacy
In this case the rampager was merely a 15 year old boy named Jeffrey who unleashed violence in his school campus. Normally crimes like these, which are conducted with no concrete reason behind them, reflect a flaw which prevails in our societies. It manifests that fact that certain immoralities are embedded within our societies, whose affect is so grave that it becomes a source of motivation for a…
The End of Privacy
The authorities have been involved in securing and establishing policies to minimize incremental advantages from such information. However, the ambivalence one experiences due to advance technology is quite right. Such technological tools do advent human kind, but they are also a main reason to erode personal privacy (Tavani, 162). Surveillance cameras, sensors, recording devices, monitors have…
Media and Privacy
It is not ethical to invade people’s privacy and it should always be paramount to protect their image (Karen 21). When dealing with cases where the person is in the public place, they expect to have their privacy protected from the public. However, they have to respect privacy but at the same time be robust about their investigation. Journalist should not disclose publicly any private,…