Sie sind auf Seite 1von 9

Introduction

This term paper entitled, Internet: The Invisible War was our topic of choosing to
complete an assigned task by Dr. Abidah Bt. Haji Mat Taib for the course ITS 610, Social,
Ethical, and Professional Issues under the Faculty of Computer Science and Mathematics of
UiTM Perlis. The paper will be focusing on various behind the scenes aspects of what actually is
going on in the backgrounds of the Internet.
The Internet itself is utilized by more than 3.2 billion users as of May 26,
2015(Davidson). This means that almost half the recorded population of planet Earth are Internet
users. However, most of these users are entirely oblivious to the dangers that plague the Internet
constantly which will be covered throughout this term paper.
Anything which is needed to further the understanding of the topic of this paper will be
supplemented. Besides that, the paper will be examining the history of how the Internet ended up
as it is today. In addition, analysis and recommendations will be included throughout the paper.
Finally, apologies if there are inconsistencies as well as errors present in this paper.

Internet: The Invisible War


As mentioned during the introduction, there are various dangers surrounding the Internet.
The most obvious which are known to many are threats from various malware such as viruses,
worms, trojans, and drive-by downloads (Superantispyware.com). The difference between these
are how they infect computers and their general infection patterns including their effects.
However, these are just considered general threats which are relatively noticeable by users in
some way eventually.

There are a multitude of hidden threats besides malware which include but are not limited
to identity theft, ransomware, DDoS attacks, and botnets (The Windows Club). These are among
the threats which Internet users face on a day-to-day basis. Nonetheless, they are just considered
to be only the surface of the dark waters of the Internet. Not many users can begin to fathom
what lies deeper nor are they even bothered with what lies beneath.

As we delve deeper into the Internet, we find the battlefield of those commonly known as
hackers which can be defined as people who enjoys exploring the details of programmable
systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only
the minimum necessary (Hess). There are several categories of these hackers which are the
white hats, black hats, and grey hats which differentiate themselves by their individual
moral code of conduct (Howtogeek.com). Norse, a cyber-threat intelligence network offers a
relatively life attack map of cyber-attacks on their supported sites which can be viewed by the
general public to see how much of a battle is constantly raging on the Internet (Norse-corp.com).

Within the darker recesses of the Internet lies what is known as the Deep Web which is
accessed by uncommon methods. It contains massive amounts of data hidden behind an invisible
wall virtually inaccessible to the common user. It can be simplified as web pages which cannot
be retrieved by search engines. Thus, it includes pages behind paywalls, registration-required
web forums, all user databases, and webmail pages (Egan). There is a massive amount of similar
pages, and they mostly exist for everyday reasons. The Deep Web yet still plays host to other
web pages which deal with purchasing of illegal contraband, political dissidents, and unusually
offered services.

These are just a summary of the major threats of the Internet. However, it does not mean
that Internet users are exposed to all of these all at once. The level of exposure is relative to what
and how the user accesses the Internet. With a sufficient amount of knowledge on computer
security, most users should be able to deflect or reduce their threat levels significantly. But there
is no such thing as true safety when utilizing the Internet and the gap between safety and threat
grows ever closer every year.

Internet: Beginning of the fall


The Internet today has veered off the original purpose of its design which is to function as
a powerful tool to share text, images, sounds, and videos between researchers (ScienceDaily). Its
intended purpose has now become its biggest flaw. The Internets essential nature of being fast,
open, and frictionless can be used to deliver malicious code along computer lines designed to
carry harmless files or e-mails (Washington Post).

Back in November, 1988, the first computer worm known as the Morris Worm created by
Robert Tappan Morris brought down a significant amount of computers causing millions of
dollars in damage (Bortnik and Bortnik). It was created to gauge the size of the Internet but due
to a critical mistake in the design, it resulted in denial of service attack instead. This was but the
calm before the storm of the Internet today.

Years later, even after hundreds of billions of dollars in computer security expenditure,
the threat levels of the Internet kept getting worse. Attacks which originally targeted just
computers have now spread to banks, retailers, government agencies, critical mechanical systems
in dams, power plants, and aircraft (Washington Post).

This most probably disappointed those who were essential in bringing the Internet to life.
They had not imagined that the Internet how popular or essential it ended up being and even
fewer at the time imagined that its availability would become open for almost anybody to use, or
to unfortunately misuse (Washington Post).

What which began as a close-knit online group for a few dozen researches is now
accessible to a few billion users. Those involved in the design of the Internet over the following
years focused on the technical aspects of moving information quickly and reliably. They had
foresaw the need to protect the Internet from potential intruders or military threats but had not
calculated that the Internets own users would eventually wage conflict with one another
(Washington Post).

Internet: Outlook and the Future


As grim as it may seem, the Internet itself is still functioning as intended. Information is
now shared faster than ever with cluster upon cluster of data being transferred to and from users
at almost all corners of the globe with an Internet connection. Even with dangers lurking within
the Internet itself, it is unarguably the most effective form of sharing information between
anyone no matter where and when they are.

It is unlikely that the now-present threats of the Internet would cease to exist eventually.
They would likely evolve to cope with the supposedly implemented security countermeasures
against them. This however may not actually be a bad thing. Conflict often brings innovation and
this is no exception. New hardware and software created may pave way to a better generation of
computing architecture as a whole.

Even today, we have the upcoming Quantum Computing generation which is estimated to
replace our current age of Silicon Computing. It would function with an entirely different
hardware and software configuration compared to computers these days. How this would affect
the Internet as a whole would eventually be seen as the technology nears the epitome of usability
which is estimated to be in 2025.

Internet: Much Needed Change


With all that has been discussed so far, there is one glaringly noticeable issue which is much
needed. This may perhaps one day veer the Internet back to the path which was envisioned by its
creators. Society itself must evolve.

Humans themselves are the root causes for everything both good and bad. Technology itself
can never be blamed, only the users behind them. The founding scientists of the Internet held a
glimmer of hope for humankind when they publically released it when they knowingly knew that
there are those who would misuse it.

It falls upon us as the next generation to inherit this technology to improve upon it and to
ensure that the legacy of what is the Internet originally is never forgotten. As it is now, people
keep viewing the Internet as a channel for hackers, pirates, and their ilk. This is however untrue,
as they only make up a relatively small part of the Internet users. It is just that misdeeds are more
actively viewed as it is a natural human behavior to be reminded of the bad when compared to
the good.

Conclusion
In conclusion, the Internet may be at the moment, a cyber-battlefield rife with various
dangers, but as mentioned previously, it is still completely usable. The purpose of the internet is
the sharing of information and it still accomplishes that marvelously. Even after knowing of the
present threats, most users would still likely be using the Internet as it is due to being the massive
information archive which it is. One day, society itself may improve as a whole towards the
better where we would no longer need to be worried of the dangers of the Internet and it may just
be a true giant digital library as envisioned.

Once again, apologies to any and all readers if there are inconsistencies and errors present
in this paper. It is the result of two degree students who are sharing their views on what the
Internet is and what it may truly become if given the chance. Thank you.

Reference
1) Bortnik, Sebastin, and Sebastin Bortnik. 'Five Interesting Facts About The Morris
Worm (For Its 25Th Anniversary)'. We Live Security. N.p., 2013. Web. 24 Nov. 2015.
2) CNNMoney,. 'What Is The Deep Web? - Cnnmoney'. N.p., 2015. Web. 24 Nov. 2015.
3) Davidson, Jacob. 'Here's How Many Internet Users There Are'. MONEY.com. N.p., 2015.
Web. 24 Nov. 2015.
4) Egan,. 'Ashley Madison Data Has Been Leaked On To The Deep Web. Where? We
Explain All'. PC Advisor. N.p., 2015. Web. 24 Nov. 2015.
5) Hess, Ken. 'What Is A Hacker? | Zdnet'. ZDNet. N.p., 2011. Web. 24 Nov. 2015.
6) Howtogeek.com,. 'Hacker Hat Colors Explained: Black Hats, White Hats, And Gray
Hats'. N.p., 2015. Web. 24 Nov. 2015.
7) Norse-corp.com,. 'Norse'. N.p., 2015. Web. 24 Nov. 2015.
8) ScienceDaily,. 'Reclaiming The Internet's Original Purpose'. N.p., 2015. Web. 24 Nov.
2015.
9) Superantispyware.com,. 'Malware, Spyware, Virus, Worm, Etc WhatS The
Difference? | Superantispyware Blog'. N.p., 2015. Web. 24 Nov. 2015.
10) The Windows Club,. 'Types Of Cybercrime, Fraud, Acts And Preventive Measures'. N.p.,
2014. Web. 24 Nov. 2015.
11) Washington Post,. 'The Real Story Of How The Internet Became So Vulnerable'. N.p.,
2015. Web. 24 Nov. 2015.

Das könnte Ihnen auch gefallen