The Dangers Of Cyberspace: Zero Days By Charles Koppelman

Great Essays
The Dangers of Cyberspace: Identifying the threats on the web in Charles Koppelman’s
Zero Days The documentary Zero Days, directed by Charles Koppelman, studies computer exploits and cyber-espionage that are conducted over cyberspace. This 2015 documentary interviews multiple professional computer hackers to explain what hacking skills they rely on in order to conduct either legal or illegal activities across the web. Whereas the scholars in this discipline focus on studying the psychology of hackers along with their communication skills used to deceive users online. Through interviews with professional hackers, this documentary analyzes why hackers are dangerous while scholars study their behaviorism and non-technical skills. Zero Days
…show more content…
The article Why Computer Talents Become Computer Hackers, by Xu Zhengchuan, gives a definition of what titles the “good” and “bad” hackers mean; “White hats are on a quest for knowledge, discovering and alerting security weaknesses in organizational systems and developing better, more secure computer systems; Black Hats go for revenge, sabotage, or outright criminal gain (such as to steal money, products, or services) (Zhengchuan 65).” Zero Days portrays these hackers as extremely dangerous individuals that work for their own profit. With these clear definitions, viewers can understand which of the two types of hackers are more dangerous. When interviewing subjects, the director never reveals to the viewer whether the hacker is White or Black Hat. This leaves the audience wondering which of the people they are looking at are criminals. These fears of the unknown plays into the vulnerability people feel when they are on the web. This …show more content…
But there are some scholars who argue differently that hackers must rely on both their telecommunication skills along with their technology knowledge to successfully cause harm. Michail Tsikerdekis, author of the article Online Deception in Social Media, argues that hackers employ the use of deception to gain access to another’s account. Tsikerdekis states, “In social media, deception can involve content, sender, and communication channel or all three together (Tsikerdekis 72).” While these sorts of attacks may rely on telecommunication skills, there are still methods of which people can work to protect themselves from being potential targets. Tsikerdekis mentions, “Training and raising awareness (such as might be taught to security personnel) could help protect users of social media (Tsikerdekis 72).” Tsikerdekis’ point serves to show the reader that hackers employ much more than just their technical skills. The scholar provides evidence to the readers that even on social media they must be aware of hackers impersonating someone and trying to trick them into giving up their personal

Related Documents

  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Hauser, Gerard “Vernacular Voices: The Rhetoric Publics and Public Spheres,” (Columbia: University of South Carolina Press, 1999). In an alternative view of the public sphere, the author discusses the idea of a rhetoric public sphere, which relies on discourse rather than economic class and face-to-face interaction. Similarly, one of the major differences between traditional physical public spheres and the Deep Web public sphere is that of discourse, which users rely on, and which follow many of the of the rhetoric properties of the author’s rhetoric public sphere. For example, the author discusses the permeable boundaries of rhetoric public spheres, and how people outside territorial groups can contribute to the discourse.…

    • 944 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Code 2600 Film Analysis

    • 391 Words
    • 2 Pages

    Technology is always constantly evolving and there are many people who play a big part in this. One of these people are known as hackers, they are usually viewed negatively in society, but despite that they have a huge part in the evolution of technology. Code 2600, directed and produced by Jeremy Zerechak is about the advancing world of technology and how ‘hackers’ are playing a big part in the advancement of technology as they push company’s to be constantly advancing and help technology become more secure. One of the prevalent themes in the documentary is that many individuals or groups that have a negative stereotype in society can play a positive role in the advancement of society. The documentary used many historical clips and news clips…

    • 391 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and networks, and homes and businesses. They have a range of options for how to get in. Software development is not a perfect process, and neither are people. We need to learn to recognize signs of hacks. Take suspicious emails for example; hackers often send…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The year of 2008, the group became increasingly associated with international hacktivism, often with the goal of promoting freedom of speech and liberty of justice. Therefore, Anonymous have gained national attention in 2008 when the group had hacked many churches and people have learned who this enormous hacktivist group is and what they do. which is a modern form of protesters in which very intelligent programmers use their hacking skills to fight back against social and political injustice. Although, nonviolent, and most acts of hacktivist are illegal, or at least uncertain legally, leading most of the perpetrators to act anonymously. Therefore, in this time of day and age many people feel that justice is not guaranteed by the laws of United States of America, some view these hacktivists as heroic who use their tech wizard to defend the public good.…

    • 311 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.”…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    The Cult Of The Dead Cow

    • 855 Words
    • 4 Pages

    The benefactors of the world’s next generation are sitting behind computer screens. Ready to create change worldwide, they are the activists of a new age; an age where technology is king among other platforms of information. Indifferent and disillusioned by careless claims made in the media, internet activist are revolutionizing the world through internet hacking. Internet activist known as Hacktivists, work to target injustice in politics and corrupt societal ideals. The world’s posterity relies upon Hacktivists groups, and the single click of a computer mouse.…

    • 855 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    There have been incidents regarding privacy intrusion on social networking sites, leading to cyberbullying, dismissals, or even worse, suicides. Also, third-party partners are also criticized for ‘phishing, and other malicious purposes’ beside data mining, according to Debatin et al. (2009, p. 86). Cybercrime nowadays are often committed through means of social media, such as hacking, scams and frauds. This fact calls for higher concern in data…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Knowing that hackers are highly intelligent people who derive pleasure in manipulating technology to do what they are not intended to, they can be very helpful in different industry where security important. As a typical hacker, you would want to know how technology work, and why they perform certain functions. Should you think like a “black hat”, “white hat”, or “grey hat” hacker? Honestly speaking, a typical hacker might be very good both in “black hat” and “white hat” techniques. The main difference between these people is what they want to achieve with their skills.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Has the Rise of Technology Negatively Impacted Relationships? As technology has became a pivotal part of society, it has changed the way that humankind interacts with one another. Technology allows people to communicate with others that could be thousands of miles away, or even across the world. This communication could be through ideas, opinions, and pictures that are shared in a way that was not possible in any other time period. Though technology has allowed people to do so many amazing things, it has also allowed for some not so great things to occur.…

    • 1399 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Importance Of Hacking

    • 984 Words
    • 4 Pages

    What do you think of when you hear the word “Hacker”? You probably think of some criminal trying to gain access to your bank account or take over your technology. The term “hacker” has gotten a bad reputation due to their portrayal by the media. The word “hacker” has been changed so much by the media that people believe all hackers are criminals and want to do harm. However, this is not the hacker's goal.…

    • 984 Words
    • 4 Pages
    Improved Essays