21st Century Hackers – Documentary Review Essay (Movie Review)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Summary of the Documentary

In the video, the author first introduces the need for new technology: to make work easier. For increased productivity and work efficiency, internet usage has grown globally, and it has turned into a multi-billion-dollar industry. However, with all this sophistication of technology, the issue of hacking comes up. According to the documentary, hacking is of three different types: white hackers, black hackers, and grey hackers. White hackers are classified as the so-called good hackers, whereas black hackers are the bad type. Lastly, the documentary outlines that grey hackers fall in between the good and bad hackers.

Initially, hacking was not meant for malicious or destructive purposes. To expound more on this term, the author introduces Samy, a white hacker who began his hacking journey through ‘My Space.’ Despite experiencing several challenges out of his hacking activities, such as being prohibited from using a computer for three years, Samy has joined a group of other white hackers to increase the security features of systems worldwide by detecting all vulnerabilities or loopholes and closing them down. The returns for such beneficial white hacking are called bounties.

On the other side, there are black hackers who use their hacking pedigree to extort money from innocent users of the internet and other technology devices. For instance, many black hackers use ransomware to demand ransom to reinstate people’s access to their personal files. Ransomware is mainly spread through emails, where the virus infects all personal files automatically when a person opens a link sent to their email. In return, the hackers encrypt all files with a key and demand ransom from their targets in exchange for the key, which allows them to gain access to their files again. Against such hackers’ actions, the U.S. secret services protect the Presidency and investigate such high-end crimes. The author gives different instances of how the secret services has tracked down the criminals.

Takeaway from the Documentary

In the presence of all these hacking issues, what stands out is that people increase the easy-access of hackers into their systems. Smartphones have penetrated into almost all parts of the world, regardless of the social stratifications, and for everyone that owns mobile phones, most of them are smartphones. Smartphone users give out their personal information, and companies globally are using this data for marketing purposes.

However, information sharing enables malicious uses by making it possible to devise ways of accessing different people in their circles and infiltrate their files; in other words, for monetary purposes. People must find out ways that these imperative devices are not used against them since it is impossible to live without them; for instance, the Tor browser is secure against being tracked by governments and companies, for whatever reasons that they may have.

Questions and/or Thoughts from an InfoSec Professional Perspective

From this perspective, several insights can be obtained to win or at least gain some ground against bad hackers’ malicious intentions. First, technology users must protect their data, for example, through frequent back-ups. Second, users must be the first line of defense against hacking or data insecurity, such as through a firm user policy of emails and other online sites. Third and lastly, it is essential always to be skeptical when dealing with new programs, tools, and projects.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, May 20). 21st Century Hackers - Documentary Review. https://ivypanda.com/essays/21st-century-hackers-documentary-review/

Work Cited

"21st Century Hackers - Documentary Review." IvyPanda, 20 May 2022, ivypanda.com/essays/21st-century-hackers-documentary-review/.

References

IvyPanda. (2022) '21st Century Hackers - Documentary Review'. 20 May.

References

IvyPanda. 2022. "21st Century Hackers - Documentary Review." May 20, 2022. https://ivypanda.com/essays/21st-century-hackers-documentary-review/.

1. IvyPanda. "21st Century Hackers - Documentary Review." May 20, 2022. https://ivypanda.com/essays/21st-century-hackers-documentary-review/.


Bibliography


IvyPanda. "21st Century Hackers - Documentary Review." May 20, 2022. https://ivypanda.com/essays/21st-century-hackers-documentary-review/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1