Home Solutions Movie Review: Cyber Movie (Blackhat) Critique
We write, we don’t plagiarise! Every answer is different no matter how many orders we get for the same assignment. Your answer will be 100% plagiarism-free, custom written, unique and different from every other student.
I agree to receive phone calls from you at night in case of emergency
Please share your assignment brief and supporting material (if any) via email here at: firstname.lastname@example.org after completing this order process.
The primary theme of the paper is Movie Review: Cyber Movie (Blackhat) Critique in which you are required to emphasize its aspects in detail. The cost of the paper starts from $120 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.
Assignment about cyber security: Critique a movie or at least 2 hours of a series that addresses a cyber issue. How realistic is the portrayal.do it with introduction, body, conclusion and opinion
Cyber Movie (Blackhat) Critique
The idea of applying cyber issues in the movies today has gained a lot of popularity especially since almost everyone is amazed at the role played by computing in the human life. Almost every aspect of the human life today involves the use of cyber technology. Unfortunately, despite the benefits they have, the threats posed by using these technologies always seems to be on the increase with malicious individuals developing different technological developments which they use to infringe into the lives of other people. At times, the malicious individuals often use these concepts to defraud other individuals, threaten them, bully them and at times exploit their human weaknesses. The movie Blackhat released on 2015 is one such film, which looks at the human life interactions with the cyber technologies while showing the threats and the aspects that malicious individuals may exploit.
Issues Raised in the Movie and Their Effects
An individual who may have interacted with the different technologies and the respective threats can easily relate to some of the areas that hackers often rely on to exploit the vulnerability of either the hardware or the software. In the Movie, Hathaway a hacker and a starring interacts with the various government officials in a bid to resolve the crime. At times, the quest to resolve these concerns leads him to rely on tactics of a hacker to use the different technologies that would lead him to solve case. The movies shows a very high level of realism not only in the applications of the technologies but also in how human beings would react in such incidences. Some of the ideas that have been relied in the movie are as threaded in this outline.
A malware according to Kshetri (25) may be defined as an intrusive or hostile software which are often relied on by different individuals to gain access to different systems and features that they would not have otherwise accessed. In the movie, the term malware has been used extensively in the context of a RAT (remote access Trojan) that gains access and controls the different aspects of a system just as an administer would. At first, it controls the cooling systems of a power plant leading to an overheat, the same RAT is also used to influence the pricing structure of the stock market leading Sadak to make huge returns on investment that were internally influence by overpricing an already purchased stock through plummeting stock prices. The malware used was a code developed by Hathaway and Chen while they were still in campus and has been relied on by Sadak the malicious individual who uses the Trojan to access to the different systems. He modified the code, which is a typical task of most coders who may rely on the different feature of the codes to enable it to function and undertake different roles as they may suppose (Von and Johan 97).
Social engineering has been extensively relied upon in the movie to comprehend the mental state of the criminals and the individuals that are in the movie. Hathaway has been noted to be very observant looking for clues and trying to understand how different individuals would think and how they would try to outsmart other people. He often moves to different places around the world looking out for clues in the crime scenes and this sets him a step ahead to botching a crime that would have occurred. At some point in the movie, he is shown to hack into the NSA systems by simply sending a malware that enables NSA employee Ben Hitchens to download a key logger unaware that he is doing so. Ben’s actions lead him to reveal his computer password, which allows Hathaway log into the NSA system.
Check Out Our Original Reviews