Chapter 7
Computer and network security
Computer and network security
Bo Burnham does not explicitly talk about computer and network security during Inside. However, when analyzing his use of technology, computer and network security can be further discussed. Inside takes place during the COVID-19 epidemic, which had a dramatic impact on computer and network security. Bo Burnham may be at a higher risk of cyber attacks because he is famous and has a considerable amount of money. He also used all of his own technology to create Inside, which might lead to cyber security issues as well.
COVID-19 had dramatic impacts on computer and network security. This is because more people were using the internet and people were not allowed to live their normal lives, which Bo Burnham portrays in Inside [2]. Leading up to COVID, there was a 50.1% increase in cyber attacks and 30,000 cyber attacks specifically targeted for COVID-19 information [1]. During COVID, almost every type of cyber attack increased [1]. There was 600% increase in phishing attacks and a 30,000% increase in cyber attacks [1]. The average ransomware payout was $178,254 [1]. Many of these attacks used high demand products, like personal protection equipment and toilet paper, to deceive people [1]. Some of these scams were conducted by impersonating public authorities from the World Health Organization [1]. COVID had drastic impacts on computer and network security.
Since the majority of cyber attacks are done with hopes to get money, it may be assumed that people with more money would want to be targeted. However, it was found by a study that cyber attacks are usually done indiscriminately. Hackers and cyber attacks attempt to impact the most people as possible [3]. It was found that cyber attacks are more prone to happen to people who lack self-control and will be more likely to download free games or documents from the internet [3]. If people exercise caution when using the internet they will be less likely to be the target of a cyber attack [3].
In production of Inside, the viewers get to see how the movie is created. We can see how Bo Burnham used all of his own technology within his house to create the Inside movie [4]. This is similar to how some companies allow people to use personal devices at work. It has been studied that this can be dangerous for the well-being of the company [5]. In 2008, 44% of organizations suffered some sort of loss from computer systems and 17% of companies reported theft of customer data [5]. Two-thirds of the time, insider attacks are purposeful [5]. Allowing people to easily transfer work data outside of the company has made it easier for these insider attacks to happen [5]. Companies and people should differentiate their work and personal devices to prevent leaking data they do not want others to know. In Bo Burnham's case, he had specific equipment for filming the movie. He may have put the movie at risk of being destroyed if he saved the takes to his personal computer and then continued to use his personal computer for surfing the web and downloading applications.
Notes
Hacking:
Malware:
Bo Burnham uses all of his own equipment to make the movie, which can connect to the security risks of employees using personal devices for work
Cyber Crime and Cyber Attacks:
Bo Burnham may be at higher risk for cyber attacks since he is famous and has a lot of money.
Criminals use malicious code to make the most money as possible.
Sources
[1] Lallie H et al., Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cybercrime and Cyber-Attacks during the Pandemic, (National Library of Medicine, March 3rd 2021), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9755115/ (09/30/2024)
[2] "Inside" by Bo Burnham (0:45)
[3] Ngo F., Cybercrime Victimization: An Examination of Individual and Situational Level Factors, (ResearchGate, January 1st 2011), https://www.researchgate.net/profile/Fawn-Ngo/publication/268410814_Cybercrime_Victimization_An_examination_of_Individual_and_Situational_level_factors/links/573dbf5e08aea45ee842d3df/Cybercrime-Victimization-An-examination-of-Individual-and-Situational-level-factors.pdf (09/30/2024)
[4] "Inside" by Bo Burnham (throughout the movie)
[5] Sarkar K., Assessing insider threats to information security using technical, behavioral, and organizational measures, (ScienceDirect, August 2010), https://www.sciencedirect.com/science/article/pii/S1363412710000488?casa_token=AdWMi1sWKm0AAAAA:e3iU6i4FMhBfeQQT2CaQvwCaG64uc1sp6Bz7fsuZSNDAlWQ_uQMfjPPQAAgEo9GvXSaJ1FFekQ (09/30/2024)