Computer and Network Security is depicted in the film by the Rev-9 terminator being able to easily hack into the camera feed of the U.S Border Patrol and being able to take over any piece of machinery.
In the film, Legion relies on robust network security protocols to protect itself from external threats. The protagonists, Sarah Connor and Grace must navigate Legion's defenses to access its core systems and thwart its plans. This involves overcoming obstacles like encryption barriers, intrusion detection systems, and automated defense mechanisms.
The Terminators themselves can also be viewed as a form of physical network security, as they attempt to track down and stop any physical activities that could threaten Legion's network and infrastructure.
The movie's portrayal of computers and network security is consistent with actual issues and instances of breaches in network security. In the same way that the Rev-9 terminator can easily infiltrate the US Border Patrol's video feed and commandeer equipment, actual cybercriminals can use system flaws to obtain illegitimate access and alter data.
In 2014, a small group of Russian hackers started what would become multiple cyberattacks on Yahoo's database [1]. Yahoo announced that about 500 million user accounts were stolen, including personal information such as name, email, date of birth, hashed passwords, and security questions [2]. It shows how few recourses are needed to take advantage of vulnerabilities in a large system.
In June 2023, hackers of possibly Russian origin breached organizations around the globe, including several U.S. federal agencies [3]. The organizations affected include the U.S. Department of Energy, the Louisiana Office of Motor Vehicles, and the Oregon Office of Motor Vehicles, among others [3][4]. The hackers found a flaw in a popular program called MOVEit, which was used for file transfer in many government agencies [3]. Data stolen includes the driver's licenses and social security numbers of 3.5 million drivers in Oregon or Louisiana [4].
References:
1.Battat, R. (2017, October). Lessons from the Yahoo Hack. Risk Management, 64(9), 14+. https://link.gale.com/apps/doc/A511368397/AONE?u=mlin_c_worpoly&sid=googleScholar&xid=a2896d7a
2. INSIGHT, C. The Yahoo! Data Breach—Issues for Congress, https://sgp.fas.org/crs/misc/IN10586.pdf
3. Lyngaas, S. (2023, June 16). Exclusive: US Government agencies hit in Global Cyberattack | CNN politics. CNN. https://www.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html
4.Lyngaas, S. (2023b, June 17). Millions of Americans’ personal data exposed in Global Hack | CNN politics. CNN. https://www.cnn.com/2023/06/16/politics/cyberattack-us-government/index.html