A view into the world of cyber security… through the eyes of the entertainment industry

quakeboy | Pixabay

We’ve all seen films like Hackers and Tron. Films that make the world of Hacking and Computer Security look crazy and exciting. The norm however, where slumping over a keyboard, in the dark, with a Red bull is far more common.

While there are many distributions that get the world of computer security completely wrong there are a few that provide a glimpse into the reality. Mr Robot, a TV series, follows an individual through his everyday life as a computer programmer. The TV series get’s many things right and has been accredited by the computer security industry as one of the most realistic of it’s kind.

The TV series get’s many things right and has been accredited by the computer security industry.

Print screen from the Mr Robot Android game

Print screen from the Mr Robot Android game

Recently, the universe of Mr Robot has been expanded into a mobile gaming application. The game follows a similar trend as the TV show. Using common terminology, lingo and concepts that circulate throughout the community.  The game opens up as if you, the user, has found a mobile phone on the side of the road. You will soon be presented with choices, in the form of text messages, as the game progresses. ‘Text messages’ then filter in as real time goes by.

Both the game and TV show focus on a form of ‘hacking’ known as social engineering. This is where information is divulged through means of manipulation. This is normally done by acting as someone who you are not.

While the game does lack in one or two areas it does a great job in expressing how certain skills and concepts are used within the hacking and computer security community. The entertainment industry should take this as an example in how to make content that is enjoyable while still being close to their real world counterparts.

James Stevenson

Im a Cyber Security enthusiast that loves all things to do with technology. I'm specifically interested in cyber security and ethical hacking.

You may also like...