Movie Review: Cyber Movie (Blackhat) Critique

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Assignment about cyber security: Critique a movie or at least 2 hours of a series that addresses a cyber issue. How realistic is the it with introduction, body, conclusion and opinion

Cyber Movie (Blackhat) Critique


            The idea of applying cyber issues in the movies today has gained a lot of popularity especially since almost everyone is amazed at the role played by computing in the human life. Almost every aspect of the human life today involves the use of cyber technology. Unfortunately, despite the benefits they have, the threats posed by using these technologies always seems to be on the increase with malicious individuals developing different technological developments which they use to infringe into the lives of other people. At times, the malicious individuals often use these concepts to defraud other individuals, threaten them, bully them and at times exploit their human weaknesses. The movie Blackhat released on 2015 is one such film, which looks at the human life interactions with the cyber technologies while showing the threats and the aspects that malicious individuals may exploit.

Issues Raised in the Movie and Their Effects

            An individual who may have interacted with the different technologies and the respective threats can easily relate to some of the areas that hackers often rely on to exploit the vulnerability of either the hardware or the software. In the Movie, Hathaway a hacker and a starring interacts with the various government officials in a bid to resolve the crime. At times, the quest to resolve these concerns leads him to rely on tactics of a hacker to use the different technologies that would lead him to solve case. The movies shows a very high level of realism not only in the applications of the technologies but also in how human beings would react in such incidences. Some of the ideas that have been relied in the movie are as threaded in this outline.


A malware according to Kshetri (25)  may be defined as an intrusive or hostile software which are often relied on by different individuals to gain access to different systems and features that they would not have otherwise accessed. In the movie, the term malware has been used extensively in the context of a RAT (remote access Trojan) that gains access and controls the different aspects of a system just as an administer would. At first, it controls the cooling systems of a power plant leading to an overheat, the same RAT is also used to influence the pricing structure of the stock market leading Sadak to make huge returns on investment that were internally influence by overpricing an already purchased stock through plummeting stock prices. The malware used was a code developed by Hathaway and Chen while they were still in campus and has been relied on by Sadak the malicious individual who uses the Trojan to access to the different systems. He modified the code, which is a typical task of most coders who may rely on the different feature of the codes to enable it to function and undertake different roles as they may suppose (Von and Johan 97).

Social Engineering

            Social engineering has been extensively relied upon in the movie to comprehend the mental state of the criminals and the individuals that are in the movie. Hathaway has been noted to be very observant looking for clues and trying to understand how different individuals would think and how they would try to outsmart other people. He often moves to different places around the world looking out for clues in the crime scenes and this sets him a step ahead to botching a crime that would have occurred. At some point in the movie, he is shown to hack into the NSA systems by simply sending a malware that enables NSA employee Ben Hitchens to download a key logger unaware that he is doing so. Ben’s actions lead him to reveal his computer password, which allows Hathaway log into the NSA system.

Corporate Espionage

Price: £120

100% Plagiarism Free & Custom Written - Tailored to Your Instructions