We're Open
+44 7340 9595 39
+44 20 3239 6980

Movie Review: Cyber Movie (Blackhat) Critique

  100% Pass and No Plagiarism Guaranteed

Movie Review: Cyber Movie (Blackhat) Critique

In this paper, you are required to present a movie review of Cyber Movie (Blackhat) Critique. You are required to discuss how realistics do you think is the portrayal in your review report. Include an Introduction, Highlighted points of the movie, and a brief conclusion in your report.  

Assignment about cyber security: Critique a movie or at least 2 hours of a series that addresses a cyber issue. How realistic is the portrayal.do it with introduction, body, conclusion and opinion

Cyber Movie (Blackhat) Critique

Introduction

            The idea of applying cyber issues in the movies today has gained a lot of popularity especially since almost everyone is amazed at the role played by computing in the human life. Almost every aspect of the human life today involves the use of cyber technology. Unfortunately, despite the benefits they have, the threats posed by using these technologies always seems to be on the increase with malicious individuals developing different technological developments which they use to infringe into the lives of other people. At times, the malicious individuals often use these concepts to defraud other individuals, threaten them, bully them and at times exploit their human weaknesses. The movie Blackhat released on 2015 is one such film, which looks at the human life interactions with the cyber technologies while showing the threats and the aspects that malicious individuals may exploit.

Issues Raised in the Movie and Their Effects

            An individual who may have interacted with the different technologies and the respective threats can easily relate to some of the areas that hackers often rely on to exploit the vulnerability of either the hardware or the software. In the Movie, Hathaway a hacker and a starring interacts with the various government officials in a bid to resolve the crime. At times, the quest to resolve these concerns leads him to rely on tactics of a hacker to use the different technologies that would lead him to solve case. The movies shows a very high level of realism not only in the applications of the technologies but also in how human beings would react in such incidences. Some of the ideas that have been relied in the movie are as threaded in this outline.

Malware

A malware according to Kshetri (25)  may be defined as an intrusive or hostile software which are often relied on by different individuals to gain access to different systems and features that they would not have otherwise accessed. In the movie, the term malware has been used extensively in the context of a RAT (remote access Trojan) that gains access and controls the different aspects of a system just as an administer would. At first, it controls the cooling systems of a power plant leading to an overheat, the same RAT is also used to influence the pricing structure of the stock market leading Sadak to make huge returns on investment that were internally influence by overpricing an already purchased stock through plummeting stock prices. The malware used was a code developed by Hathaway and Chen while they were still in campus and has been relied on by Sadak the malicious individual who uses the Trojan to access to the different systems. He modified the code, which is a typical task of most coders who may rely on the different feature of the codes to enable it to function and undertake different roles as they may suppose (Von and Johan 97).

Social Engineering

            Social engineering has been extensively relied upon in the movie to comprehend the mental state of the criminals and the individuals that are in the movie. Hathaway has been noted to be very observant looking for clues and trying to understand how different individuals would think and how they would try to outsmart other people. He often moves to different places around the world looking out for clues in the crime scenes and this sets him a step ahead to botching a crime that would have occurred. At some point in the movie, he is shown to hack into the NSA systems by simply sending a malware that enables NSA employee Ben Hitchens to download a key logger unaware that he is doing so. Ben’s actions lead him to reveal his computer password, which allows Hathaway log into the NSA system.

Corporate Espionage


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: Movie Review: Cyber Movie (Blackhat) Critique
  • Price: £ 120
  • Post Date: 2020-05-14T04:57:25+00:00
  • Category: Assignment Queries
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

Movie Review: Cyber Movie (Blackhat) Critique Movie Review: Cyber Movie (Blackhat) Critique
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I have been taking help from Insta Research since 2015 and believe me, this place is incredible in giving the best help in assignments and essays. I also ask them to run plagiarism in my essays that I have written, and they always gave me accurate results. I am literally blessed to have a strong bonding with this site so that in any need of urgency, I contact them and find them always beside me. Thank you!
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

The writer 0223 is really helpful. He gave me the best essay ever. Love you loads for such a great job and thanks again.