ITGS Syllabus

Wednesday, February 01, 2006

Topic 17

Vulnerability of networks to intrusion by Isaku Oba

Over the years the increase in digital technology has succeeded in making the internet much more sophisticated beyond the imagination of the people who created the model of today’s internet. However, these revolutionary developments in the network have come with significant side effects.

The user friendly environment and the many attractive services the internet offers have been used by many people in developed countries and have succeeded in connecting huge numbers of totally unrelated people who do not even live close to each other. Also still it is these three of the most obvious benefits that have resulted in making our personal information vulnerable towards possible ‘thefts’ from others.

The first aspect, the connection of many people anonymous to each other has given skilled computer programmers a reach towards personal information. In order to steal personal information without the internet, it is required for the stealer to actually get to the source of the information, but in the internet, the dimension of distance has become almost nonexistent. This is extremely important because without the internet the stealer actually has to come in physical constant to the direct source of information. In this case the stealer leaves a trail behind him, which will allow the victim to find out who stole the information. When we are connected to the internet through our server which contains our personal information, it is like going into a building carrying a briefcase full of our information, making us extremely vulnerable to theft.

It is also impossible to neglect that the internet connecting us to almost all the people in the world will make everyone in connected to the internet, even those who have never met the stealer, or even live on the other side of the world. Therefore if a person can design computer programs which can some how extract information from a ‘trap’ that lets him view information through our server, he can steal information from anyone, anytime, and anywhere. This raises the ethical issue of the power held by these programmers, which leaves the fate of our information to the ethical values of these programmers. We will have to take more caution in our life using the internet, for example not entering suspicious sites as they may be traps and taking precautions in our email as there might be Trojans inside them.

The vulnerability of personal information obviously does benefit the creator of the technology, the programmers, who may sell the information they gain or use it to create other benefits for himself: but another group that takes advantage of the suffering of normal internet users who fearing loss of information is the network security companies. The internet users will now live in fear of people looking at their personal information. This will cause the demand for programs that prevent this to rise, creating more benefit to companies which make products such as anti virus programs, Trojan detectors, fishing site scanners, and trap searchers.

The internet is a sophisticated technology that connects the whole world together. What we cant forget is that all technology comes with its tradeoffs.


11 Comments:

Anonymous said...

This essay is a very well structured essay. Who the man! That's right! I loved it. Essay is your face. Yeah!

Wednesday, November 29, 2006 7:32:00 PM


moyer said...

This essay shows the problems that the development of technology ironically presents. The threat posed by connection of worldwide people by the internet does indeed increase the need of caution.

Thursday, December 07, 2006 7:10:00 PM

moyer said...

i love sujit

Thursday, December 07, 2006 7:25:00 PM

taro kondo11 said...

it mightve been good if you talked about the solutions to intrusion deeper.
i did get the message that its a scary world though.. anonymous users shouldnt be trusted 100%

Saturday, December 09, 2006 1:09:00 AM

Anonymous said...

I agree with Sujit that your essay was layed out nicely, explaining the details in order. It would help too if you wrote about ways to prevent people these anonymous users from stealing our personal information. It seems simple to avoid them but like written in your essay these people can trap you into giving the information they want.

Monday, December 11, 2006 5:51:00 AM

Anonymous said...

i love you too moyer

Monday, December 11, 2006 6:30:00 PM

ronniewonnie said...

This is a very well structured essay.
You cleary explain the problems that the development of technology presents to us.
You may want to write about ways to prevent people from stealing our important personal information.
Ronald Chu

Monday, December 11, 2006 9:37:00 PM

harsh said...

I agree with Joseph, gotta mention some ways that you can prevent these people from intruding your networks. One of the ways, of course, is firewall. Windows Defender seems to do a good job at that. However, the easiest and the best way is to purchase a mac and enjoy a virus-spyware-firewall free life! Just let the mac take care of your privacy. No need to install any third-party software!

Tuesday, December 12, 2006 2:28:00 AM

Chun said...

I agree with you and as much as the digital technololgy have helped us, it also has put as in danger of making our personal information vulnerable. Therefore, we need more extreme caution to protect this. Anyway very well written essay!

Thursday, December 14, 2006 5:14:00 AM

Anonymous said...

a well structured essay as sujit said and also analyzes pros and cons(such as those of digital technology) effectively.
Slightly bothersome was that you said that only people from developed countries avail internet services. The creator of hotmail is indian(and india is developing). jai hind

Friday, December 15, 2006 6:17:00 AM

Vaibhav said...

The internet has increased so many job oppurtunities, and also has limited some jobs. But the overall impact of the internet has made life more efficient and comfortable. "Imagine yourself starting from tommorow with no internet."

Tuesday, December 19, 2006 5:20:00 AM

1 Comments:

Blogger Joseph Toyoshima said...

I agree with Sujit that your essay was layed out nicely, explaining the details in order. It would help too if you wrote about ways to prevent people these anonymous users from stealing our personal information. It seems simple to avoid them but like written in your essay these people can trap you into giving the information they want.

January 11, 2007 12:11 PM  

Post a Comment

<< Home