The Pros And Cons Of Internet Security

Superior Essays
Internet, one of the greatest inventions in the 1970s, originally came from a communication system developed by the United States during the Cold War. As technology has improved, the network system has grown rapidly. From the beginning of military communication system to now which everything is possible through Internet. Based on the record of the company Internet Live Stats, the number of the Internet users had grown from three hundred and sixty million in 2000 to three billion in 2014. More and more people in the world can get information faster and easier by using the Internet. However, not all of the people consider to have the easy access to the Internet a positive force to the society. As more and more people can get on internet, some governments began to feel their power being challenged. Therefore, they have started to see the growth of Internet users as a tremendous threat to their power. Their leaders, especially the dictators who are afraid that people would have power to overthrow them, have begun to restrict people’s freedom and opportunities to get access to the internet and the wide world.

Internet security has been proven to be one of the ways used by governments to control people and hold their power. Among its
…show more content…
Governments used Internet security as one of the ways to Internet secruity is used by every countries for either safety or political status for their own benefits; it is hard to say whether it is good or not. It seems to be unfair and unequal to us citizens because the governments are abusing their authorites. Still, there is no doubt that it is efficient way for governments to ensure that their adveraries are not oppressing our countries and causing crises. As long as the internet is the most convenient way to spread information, governments will keep using this technology as one of the most powerful tool to maintain nations’

Related Documents

  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This article will help me with my project because it demonstrates the value of Internet technologies as a democratic medium, similar to newspapers in the 19th century. However, this source will contribute to the purpose of my paper in disagreement with the claim that the Internet emulates associational life, where people came to freely discuss and formulate ideas, due to issues of surveillance and mediation form governments and corporations. Alternatively, it will help my argument by showing how certain aspects of Deep Web infrastructure (like Tor, and other private software) contribute to the true democratic value needed to be considered a public sphere.…

    • 944 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Although it’s an earlier American invention, the internet became increasingly popular internationally, including in Canada in the 1990s. The World Wide Web emerged as the most popular way to browse the network in 1991. The internet is an international linking of computers that allows easy transfer of information between networks. The increasing influence of the internet increased globalization and has changed the way people communicate as well as use information around the world. The internet allowed communication internationally and marked the beginning of the ‘global village’…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The very idea of a worldwide system that could send messages instantly was a mere fantasy until the year of 1969. Of which the first internet message was sent, “Lo”. In direct result, the era of the Internet was kickstarted into existence. It would be twenty years, in 1989, until the first service providers were erected into existence. Major companies such as Comcast wouldn’t start to provide high speed internet until the late 2000’s.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In today’s world, everyone is always on their phone or on the internet. Whether it be for work or just for personal pleasure, the internet is being used all the time by almost everyone. In the article “The Internet Is a Surveillance State” written by Bruce Schneier, many examples are shown that provide evidence that everything that people do on the internet is now being tracked. The author is a security technologist and author of Liars and Outliers: Enabling the Trust Society Needs and many other novels regarding security.…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    "The government monitors a lot of internet usage around the US, that most people probably are not even aware of. The government monitors phone calls, instant messages, facebook posts, and contact lists. To some people this may seem ridiculous but in some cases it is necessary. In today’s world, the internet is used for pretty much everything. The internet also makes it easy to keep things a secret, it is easy to try and hide things from others while using the internet.…

    • 506 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    "Government Internet Monitoring: Side Effects, And Where to Draw the Line National security is tricky to keep track of now. With cellular phones, the internet, and various other forms of national and international communication and commerce, the government has found multiple ways to monitor and protect people from malicious/illegal content. The issue, however, with the many ways the government can monitor internet usage, is where to draw the line. Monitoring isn't perfect, but it needs some type of regulation to be executed correctly.…

    • 554 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Terrorist Purpose

    • 537 Words
    • 3 Pages

    The use of the Internet for Terrorist Purpose is a problem that is growing very rapidly. The internet has become an important way of influencing people about terrorism and terrorists. Terrorists use the internet as a base to recruit and identify as well as train members. By using the internet, they are able to plan terrorist attacks, take in and transfer funds, a form of propaganda and gathering in information for terrorist purposes. There are many benefits for the use of the internet however there are also many disadvantages that come from using the internet as well, like as stated for terrorist purposes.…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    bstract An analysis is performed of global interconnectivity around cybersecurity and its impact on the pursuit of global commerce. Cultural influences, practices, and perspectives are reflected upon as they incorporate ethical, political, and social viewpoints. Cultural philosophical perspectives integrate attitudes, beliefs, values, and political agendas which help navigate tangible or intangible formations of a particular culture. As a result, products involve underlying beliefs and values and cultural practices.…

    • 1383 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The internet holds thorough information about our lives, but the fact it’s been in existence for only 20 years makes it easy access for problems like crashing and hacking. It also mentioned how people are able to mask their being and also give a false testify because their identity remains unknown. They know in due time people will transition to smartphones which allows us to store personal information on these portable devices. It also mentioned the fight for internet freedom in developing countries is a life and death issue. It also gave a view how we will store more information as the…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Dell Theory

    • 1283 Words
    • 6 Pages

    The Dell Theory of conflict prevention introduces a massive industry of supply chains working together. Friedman’s theory starts off with introducing how the world works together and shows us how an entire global supply chain produces his Dell notebook. It is the fact that non-credible countries are getting involved in this industry of production that caused Friedman to propose his theory. The Dell Theory of Conflict Prevention argues that if two countries are working together there will not be a cause for war, but there are limitations to this statement. Limitations to the dell theory are mutant supply chains where destruction is unavoidable, and the fact that world conflict has turned more into wars between groups vs. nations rather than…

    • 1283 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Internet in the way most people recognize it was formed around the beginning of the 1990s when scientist Tim Berners-Lee developed the World Wide Web. It has changed how we shop, how we are entertained, how we receive the news and how we get information. (Thomas, 2016). The Internet moves data from one place to another very…

    • 923 Words
    • 4 Pages
    Improved Essays