StudentShare solutions
Triangle menu

Cybercrime, privacy and security concepts in the film WarGames - Essay Example

Nobody downloaded yet

Extract of sample
Cybercrime, privacy and security concepts in the film WarGames

Therefore, he takes his time to engage in cybercrimes and hacking of computer security codes in search of games to play (Bischoff, 1983). His hacking practice eventually leads him to a US supercomputer that is highly secured, due to the sensitive nature of the information it contains. This information is potentially dangerous and capable of causing world destruction through sparking World War III, which is a war of nuclear weapons. The super computer was programmed to launch missile attacks automatically, on the event of being ordered to start such an action, after the Air Force Strategic missile operatives were unwilling to turn on the button which could spark off the nuclear missile attacks (Franklin, 2008). Considering that none of the operatives wanted to be the cause of the devastating attack that could wipe out the whole world, a super computer had to be programmed, which could easily be turned into action by a simple computer operation procedure. Therefore, initially perceiving the WOPR (War Operation Plan Response) program as another exciting game, David Lightman, (Broderick) embarks on a mission to unearth the backdoor password that can be used to hack into, and access the Supercomputer details (Bischoff, 1983). Being a computer whizz, and with the help of his friend who were also hackers, Broderick eventually manages to unearth the backdoor password and starts operating the computer program by running the nuclear war simulation, through his own computer (Franklin, 2008). Considering the threat posed by this computer operation, the simulation scares the whole security and military departments, since it almost causes a full blown World War III, which is a devastating war of nuclear missiles. This cyber crime and security intrusion into the US military department security systems is a form of black hat hacking. This is because, black hat hacking entails the process of violating and cracking computer security systems with malicious intentions of benefiting oneself (Hanser, 2011). Broderick had been hacking other computer security systems previously, to gain access to computer games that he could play. In the process of searching for more interesting computer games, other than chess, poker and checkers which he had previously accessed, he embarked on searching for new games, which led him to the supercomputer, which seemed to possess a different nature of games than he had been used to (Bischoff, 1983). This practice of hacking into other computer security systems and accessing games to play, instead of purchasing such games from the manufacturers or retailers, is a selfish crime. Additionally, hacking into other security systems without the knowledge of the owners of the systems, regardless of the intentions an individual has, is malicious and damaging (Johnston, 2011). Therefore, this act of Broderick hacking and accessing the security systems of the US supercomputer and his continuation to simulate the war programs is a form of black hat hacking, since it involves the violation of computer security and privacy laws (Subramanian, 2008). The fictional narration of this film falls under the following three categories: Cybercrime Cybercrime refers to any act of an individual to use computers or computer networks for crime. This can occur in the form of using the computer to commit crime or targeting other computers with some criminal intentions (Hanser, 2011).The film WarGames (1983), depicts both forms of crime. There is a crime of using computers to commit a violation of the acceptable computer privacy and security guidelines. Here, Broderick, who is a bright but highly unmotivated teenager, engages in the act of using ...Show more


Cybercrime, privacy and security concepts in the film WarGames (1983)
The film, WarGames (1983), is a film narrating a fictional story of a young computer wizard, who is very intelligent and still in high school, but appears to be unmotivated. …
Author : allie66
Cybercrime, privacy and security concepts in the film WarGames essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Cybercrime, privacy and security concepts in the film WarGames"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Whether or not these issues are best handled in a legal manner or some other manner that is not legal, however, is the issue that is the topic of this paper. All of the subtopics that are covered – data breaches, illegal downloads and child pornography – can be covered by some method that does not involve the legal system.
18 pages (4500 words) Essay
Privacy & Security
According to the paper as ‘Electronic commerce’ evolves the business practices of the business around the world in terms of profitability, success, and gaining competitive advantages. Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business.
26 pages (6500 words) Essay
Security versus privacy
Varity of small arms and weapon components are available for concealed carry which poses a challenge to maintain security and detect threats. As a result individuals need to be checked thoroughly to detect even smallest of components that can be used in terror or sabotage activities.
6 pages (1500 words) Essay
Matthew Broderick memorably stars as 17-year-old David, a computer geek who spends a great deal of his time trying to figure out ways to hack into places for his own entertainment, or to do such delinquent deeds as changing his own grades in the school computers.
2 pages (500 words) Essay
Privacy and security
Privacy and security go hand in hand in matters of the internet, businesses and even homes. Privacy remains one of the top priorities of the internet and the need for it grows manifold every year with e-commerce becoming more and more popular. With viruses increasing
3 pages (750 words) Essay
Security versus privacy
As a result individuals need to be checked thoroughly to detect even smallest of components that can be used in terror or sabotage activities. This requirement links security and privacy since we cannot
6 pages (1500 words) Essay
Privacy and Security
These efforts, however, have come under fire after Edward Snowden revealed details of classified U.S. surveillance programs. Snowden is a former Central Intelligence Agency (CIA) employee, and a former National Security Agency (NSA) contractor who revealed
4 pages (1000 words) Essay
internet protocol. Cybercrime is defined as the act that is executed against the availability, confidentiality and integrity of the internet users. In terms of the global connectivity, cybercrime reflects a broad
5 pages (1250 words) Essay
However, great advances in science and technology in developed countries is as a result of a well established information system. Therefore, the rate of science and technology in a country is very important to any economy. On the other hand,
5 pages (1250 words) Essay
The author provides an overview of the tendencies and development of the cross-border flows of “dirty money” in global scales. Thus, the overall amount of laundered money has exceeded 2, 5 trillion USD in 2009 (Schneider 2013). The
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us