1,461
21
Review, 3 pages (650 words)

Free movie review on computer and network forensics

Introduction

The relevance of this movie to this course
The Net was released in the year 1995 and was directed by Irwin Winkler. The movie’s key theme revolves around the modern computer technology, its complexity and crime. Action begins when Angela Bennet realizes that her identity had been changed and replaced with that of a criminal, because she actually owned a floppy disk which belonged to a group of terrorists called the ” cyberterrorists”. Angela Bennet is able to access information from corporate systems and federal systems. The cyber terrorists would stop at nothing to protect this top secret. The cyber terrorists are a group of technology experts who build security systems for various organizations. This gives them a backdoor access to vital information from these organizations.
Action and drama unfolds as Angela Bennet escapes this gang and actually defeats them in their own game. Angella Bennet beats plans of this gang and protects her life through her computer technology wizardry . Angela Bennet uses the mouse and the key board as her major weapon to combat this cyber crime gang.
Computer and network forensics has become a vital sub branch in computer and network technology. This course mainly focuses on acquisition of knowledge regarding to protection of information, controlling network traffic and detecting intrusion of a computer network. In the modern world of information technology; cyber crime, hacking of systems and unauthorized retrieval of information has become very common. This course provides knowledge to tackle crime related to computer network as well as providing forensic assistance. The movie (The Net) is very relevant to the course. Various aspects of Computer and network forensics come into play in satisfying the thematic needs of the movie. Cyber and computer network crimes studied under this provide the basic source of conflict in the movie. All computer and network forensic students and experts can relate a lot to the movie.

What are the measures you will take to resolve the main issues in this movie?

The virus that presents in gatekeeper security program can be avoided through installing the computers with an anti-virus. This will help to prevent the program form being infected by this malfunctions therefore the data saved in the program will always remain safe and the disk will be free from harm.
Another issue that arises in the film is impersonation. Jack and the other members of praetorians had taken Angela identity. The solution that will be helpful to bring back her identity must be solved by computer wizards.
Since jack had impersonated Angela with ” Ruth Marx”, this must be solved very fast. There is need for computer expert to de-bug the program using a weird glitch. This will prevent jack from adding crimes to her in the police record.
Through de-bugging, Angela will discover a certain government file that will show that she was free from HIV. She will therefore track the imposter that logs into the program without her consent and take the best measures to curb his influence in the program. By protecting the gatekeeper program, all issues of hacking and imposter will remain a nightmare therefore the issues will have been solved.

As a Forensic expert, how would you tackle this issue? Are there any solutions to this dilemma?

Cyber-crime has become a business risk and challenge. Various organizations shave resulted into improvising measures to curb cybercrime in order to protect their information. As an expert in the field of computer and network forensics I would advocate for use of private and public proxy, encryptions and various plausible deniability methods. Computer clouding is another method of protecting information and system from hackers. Computer clouding acts as data back up as well as protecting system infrastructures from attack. However, as a computer expert I would advise fellow computer scientists to device new methods of tackling this crime since criminals are advancing their strategies day in day out.

Work cited

Owen Gleiberman . “‘The Net’ review at EW”. Retrieved 2010-08-23, August 4, 1995

Thank's for Your Vote!
Free movie review on computer and network forensics. Page 1
Free movie review on computer and network forensics. Page 2
Free movie review on computer and network forensics. Page 3
Free movie review on computer and network forensics. Page 4

This work, titled "Free movie review on computer and network forensics" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Review

References

AssignBuster. (2022) 'Free movie review on computer and network forensics'. 15 September.

Reference

AssignBuster. (2022, September 15). Free movie review on computer and network forensics. Retrieved from https://assignbuster.com/free-movie-review-on-computer-and-network-forensics/

References

AssignBuster. 2022. "Free movie review on computer and network forensics." September 15, 2022. https://assignbuster.com/free-movie-review-on-computer-and-network-forensics/.

1. AssignBuster. "Free movie review on computer and network forensics." September 15, 2022. https://assignbuster.com/free-movie-review-on-computer-and-network-forensics/.


Bibliography


AssignBuster. "Free movie review on computer and network forensics." September 15, 2022. https://assignbuster.com/free-movie-review-on-computer-and-network-forensics/.

Work Cited

"Free movie review on computer and network forensics." AssignBuster, 15 Sept. 2022, assignbuster.com/free-movie-review-on-computer-and-network-forensics/.

Get in Touch

Please, let us know if you have any ideas on improving Free movie review on computer and network forensics, or our service. We will be happy to hear what you think: [email protected]