The Dangers Of Cyberspace: Zero Days By Charles Koppelman

Great Essays
The Dangers of Cyberspace: Identifying the threats on the web in Charles Koppelman’s
Zero Days The documentary Zero Days, directed by Charles Koppelman, studies computer exploits and cyber-espionage that are conducted over cyberspace. This 2015 documentary interviews multiple professional computer hackers to explain what hacking skills they rely on in order to conduct either legal or illegal activities across the web. Whereas the scholars in this discipline focus on studying the psychology of hackers along with their communication skills used to deceive users online. Through interviews with professional hackers, this documentary analyzes why hackers are dangerous while scholars study their behaviorism and non-technical skills. Zero Days
…show more content…
The article Why Computer Talents Become Computer Hackers, by Xu Zhengchuan, gives a definition of what titles the “good” and “bad” hackers mean; “White hats are on a quest for knowledge, discovering and alerting security weaknesses in organizational systems and developing better, more secure computer systems; Black Hats go for revenge, sabotage, or outright criminal gain (such as to steal money, products, or services) (Zhengchuan 65).” Zero Days portrays these hackers as extremely dangerous individuals that work for their own profit. With these clear definitions, viewers can understand which of the two types of hackers are more dangerous. When interviewing subjects, the director never reveals to the viewer whether the hacker is White or Black Hat. This leaves the audience wondering which of the people they are looking at are criminals. These fears of the unknown plays into the vulnerability people feel when they are on the web. This …show more content…
But there are some scholars who argue differently that hackers must rely on both their telecommunication skills along with their technology knowledge to successfully cause harm. Michail Tsikerdekis, author of the article Online Deception in Social Media, argues that hackers employ the use of deception to gain access to another’s account. Tsikerdekis states, “In social media, deception can involve content, sender, and communication channel or all three together (Tsikerdekis 72).” While these sorts of attacks may rely on telecommunication skills, there are still methods of which people can work to protect themselves from being potential targets. Tsikerdekis mentions, “Training and raising awareness (such as might be taught to security personnel) could help protect users of social media (Tsikerdekis 72).” Tsikerdekis’ point serves to show the reader that hackers employ much more than just their technical skills. The scholar provides evidence to the readers that even on social media they must be aware of hackers impersonating someone and trying to trick them into giving up their personal

Related Documents

  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hauser, Gerard “Vernacular Voices: The Rhetoric Publics and Public Spheres,” (Columbia: University of South Carolina Press, 1999). In an alternative view of the public sphere, the author discusses the idea of a rhetoric public sphere, which relies on discourse rather than economic class and face-to-face interaction. Similarly, one of the major differences between traditional physical public spheres and the Deep Web public sphere is that of discourse, which users rely on, and which follow many of the of the rhetoric properties of the author’s rhetoric public sphere. For example, the author discusses the permeable boundaries of rhetoric public spheres, and how people outside territorial groups can contribute to the discourse.…

    • 944 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Academic Search Premier. Web. 24 Feb. 2015. http://web.b.ebscohost.com.ezproxy1.lib.asu.edu/ehost/detail/detail?vid=14&sid=59fa9ad9-2c8c-4d6d-9ad4-14cae4591c9d%40sessionmgr4003&hid=128&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aph&AN=98905897 Soraya Chemaly, a media critic and activist for Time, writes about how hacking is a hate crime. The majority of the celebrity hackings in 2014 were women and there hasn’t been a discussion in terms of gender-based hate, and why there aren’t pictures of men involved in the hackings.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Akesha White Information Technology in Criminal Justice Professor: Lisa Kramer 07/07/2015 Four board categories of computer crimes are: Hacking, this is where do something of defeat the sanctuary capability of a computer system in classifieds to obtain an unlawful access to the in order store on the computer system is known as hacking. Another extremely hazardous computer crime is the hacking of IP address in sort to conducting with a false identity, which will remain unknown while carrying out the criminal behavior.Phishing, this is where doing something in the attempt to obtain insightful information like usernames, secret word, and credit card data by concealing as a dependable final place. Phishing is carried all the way through emails or by luring the users…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Knowing that hackers are highly intelligent people who derive pleasure in manipulating technology to do what they are not intended to, they can be very helpful in different industry where security important. As a typical hacker, you would want to know how technology work, and why they perform certain functions. Should you think like a “black hat”, “white hat”, or “grey hat” hacker? Honestly speaking, a typical hacker might be very good both in “black hat” and “white hat” techniques. The main difference between these people is what they want to achieve with their skills.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Cult Of The Dead Cow

    • 855 Words
    • 4 Pages

    The benefactors of the world’s next generation are sitting behind computer screens. Ready to create change worldwide, they are the activists of a new age; an age where technology is king among other platforms of information. Indifferent and disillusioned by careless claims made in the media, internet activist are revolutionizing the world through internet hacking. Internet activist known as Hacktivists, work to target injustice in politics and corrupt societal ideals. The world’s posterity relies upon Hacktivists groups, and the single click of a computer mouse.…

    • 855 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The year of 2008, the group became increasingly associated with international hacktivism, often with the goal of promoting freedom of speech and liberty of justice. Therefore, Anonymous have gained national attention in 2008 when the group had hacked many churches and people have learned who this enormous hacktivist group is and what they do. which is a modern form of protesters in which very intelligent programmers use their hacking skills to fight back against social and political injustice. Although, nonviolent, and most acts of hacktivist are illegal, or at least uncertain legally, leading most of the perpetrators to act anonymously. Therefore, in this time of day and age many people feel that justice is not guaranteed by the laws of United States of America, some view these hacktivists as heroic who use their tech wizard to defend the public good.…

    • 311 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Steven Levy: Hacker Ethics

    • 1453 Words
    • 6 Pages

    Being a hacker has evolved through the centuries. Recent past indicates a hacker as a person that gets into the system of a company or individual in order to obtain information, or to damage the computer. However, in Steven Levy’s text, he indicates a hacker as someone who is trying to push the limits farther, as being a visionary or adventurer. What Steven tried to accomplish was to bring forward the contributions that these innovators laid the foundation for. He was not trying to tell the story of the richest or the most popular, but the story of those that spent countless hours in intimacy with the machine itself, the real story behind the computer revolution.…

    • 1453 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Has the Rise of Technology Negatively Impacted Relationships? As technology has became a pivotal part of society, it has changed the way that humankind interacts with one another. Technology allows people to communicate with others that could be thousands of miles away, or even across the world. This communication could be through ideas, opinions, and pictures that are shared in a way that was not possible in any other time period. Though technology has allowed people to do so many amazing things, it has also allowed for some not so great things to occur.…

    • 1399 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What Is Normative Order?

    • 213 Words
    • 1 Pages

    Holt demonstrates how hackers impact differentially in virtual versus real experience by using the concept of “Normative Order”, in which is a “set of generalized rules and common practices oriented around a common value”. The normative order is divided into five terms, which are technology, knowledge, commitment, categorization and law. Technology which is one of the five normative order explains that “The more time hackers spent familiarizing themselves with technology, the more their skill level increase”. Indicating that due to hackers spending a large amount of time using technology, they discover new things for the society which in this case wardriving, Wifi and robotics challenges, which demonstrates how important technology is in…

    • 213 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    There have been incidents regarding privacy intrusion on social networking sites, leading to cyberbullying, dismissals, or even worse, suicides. Also, third-party partners are also criticized for ‘phishing, and other malicious purposes’ beside data mining, according to Debatin et al. (2009, p. 86). Cybercrime nowadays are often committed through means of social media, such as hacking, scams and frauds. This fact calls for higher concern in data…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Importance Of Hacking

    • 984 Words
    • 4 Pages

    What do you think of when you hear the word “Hacker”? You probably think of some criminal trying to gain access to your bank account or take over your technology. The term “hacker” has gotten a bad reputation due to their portrayal by the media. The word “hacker” has been changed so much by the media that people believe all hackers are criminals and want to do harm. However, this is not the hacker's goal.…

    • 984 Words
    • 4 Pages
    Improved Essays