The Dual Nature of Human-Created Technology

writer-avatar
Exclusively available on PapersOwl
Updated: Dec 05, 2024
Listen
Download
Cite this
Date added
2020/04/09
Pages:  3
Order Original Essay

How it works

I firmly believe that everything created by humans can also be undone by them. Throughout history, humans have demonstrated remarkable intelligence, propelling us to become the most advanced species on Earth. Our innovations have led to the creation of technologies that, at times, seem to surpass human intelligence. However, if these technologies ever threaten to supersede human intellect entirely, they can also be dismantled. The Internet is a prime example of such a dual-natured invention. It has woven itself into the fabric of modern life, fostering dependencies that have resulted in billions of people worldwide relying on it for tasks both monumental and mundane.

Need a custom essay on the same topic?
Give us your paper requirements, choose a writer and we’ll deliver the highest-quality essay!
Order now

Vulnerabilities in a Digital World

The Internet is now integral to the operations of sensitive sectors such as government, finance, and banking. As more aspects of daily life transition to digital platforms, we reduce the necessity for human labor but simultaneously increase the risk of devastating cyber threats, potentially culminating in cyber warfare. The Internet, while appearing wireless, is underpinned by a vast network of cables buried beneath the Earth's surface. This intricate web of connections has been crafted from robust, old-fashioned cables, many of which are submerged underwater, making them elusive and challenging to pinpoint. Destroying the Internet, while conceivable, involves a series of complex steps.

One theoretical approach to crippling the Internet is through the destruction of these cables. However, the precise locations of these cables are kept confidential, posing a significant obstacle to anyone attempting to locate and destroy them. Another potential target could be the root servers, which are crucial to Internet functionality. Yet, this would require an extensive and coordinated effort, as it involves dismantling tens of thousands of IP addresses alongside the servers, an endeavor that is logistically daunting.

Datacenters, which house servers that store sensitive and personal data such as emails, photos, and web browsing history, could also be targeted. Severing the cables would fragment the Internet into isolated, non-communicating networks, effectively halting global data exchange. Although certain nations, such as China, Iran, Syria, and North Korea, have experimented with an "Internet Kill Switch," the Internet remains largely ungoverned. International bodies like the Internet Corporation for Assigned Names and Numbers (ICANN) have only limited oversight, focusing on website accessibility and protocol standards. The Internet's vastness and ubiquity make it nearly impossible for any single entity to govern it comprehensively.

Pathways to Global Internet Governance

To ponder the feasibility of global Internet governance, we must identify the myriad issues necessitating regulation. Key among these is network architecture, which encompasses potential technical challenges and their resolutions to ensure smooth network operation. Additionally, content control, including spam management and the eradication of child pornography, is a pressing concern. Cybercrimes, including terrorism, hacking, and network disruptions, also demand attention. While some international organizations are addressing these issues, they struggle to keep pace with the rapid evolution of cyber threats. Therefore, a collaborative approach involving NGOs, technical experts, and corporations could yield more robust solutions by integrating technical, political, and economic perspectives.

Securing Digital Communication

Public Wi-Fi, commonly used in malls, hotels, and shops, poses significant security risks, even when password protected. Understanding how data is transmitted between computers and the Internet is crucial. For example, when sending an email or watching a video, data is broken into packets containing information like website requests, usernames, and passwords. These packets are typically unencrypted, exposing them to interception by knowledgeable individuals using tools like Wireshark. Most computers, particularly those running Windows, limit packet transmission to direct exchanges with the router. Hackers, however, employ additional Wi-Fi adapters to capture packets from other devices on the network.

To mitigate these vulnerabilities, prefer browsing HTTPS links over HTTP, as the former offers stronger encryption, though not infallible. HTTPS prevents hackers from viewing specific page activities, safeguarding data like cart details and transaction information on sites such as Amazon. Despite Google's acknowledgment of HTTPS as a ranking factor, the predominance of mobile applications in web traffic means encryption is not always guaranteed. For instance, while WhatsApp employs end-to-end encryption, many Google messaging apps do not. To protect sensitive activities, such as online banking, from unsecured networks, utilize a Virtual Private Network (VPN). This ensures that hackers can only detect the VPN connection, concealing subsequent activities.

In conclusion, while the Internet is a remarkable testament to human ingenuity, it also underscores our vulnerabilities. By adopting robust security measures and advocating for comprehensive governance, we can harness its benefits while mitigating its risks. This delicate balance is essential for fostering a secure and connected global community.

The deadline is too short to read someone else's essay
Hire a verified expert to write you a 100% Plagiarism-Free paper
WRITE MY ESSAY
Papersowl
4.7/5
Sitejabber
4.7/5
Reviews.io
4.9/5

Cite this page

The Dual Nature of Human-Created Technology. (2020, Apr 09). Retrieved from https://papersowl.com/examples/cybersecurity-protecting-the-fragile-web-of-global-connectivity/