It is true to say that we now live in a global village
thanks to enhanced communication links, powerful computers and the internet.
Information and communication technology helps man to connect to one another in
every aspect of life today from financial transactions to meeting friends. This
interlinked world may appear to be fast and convenient but have we ever
wondered whether our privacy and safety is ensured in it?
Although computer technology was prevailing since 1930s,
first real collaboration and data sharing among computers appeared with the
development of ARPANET (Advanced Research Projects Agency Network) for United
States Department of Defense. That along with the World Wide Web which is a set
of interlinked documents allows data sharing and collaboration from anywhere in
the world at any time. Now most of the personal computers can access the
internet and there are powerful computers such as datacenters and internet
servers which stores data and facilitate running various applications in the
internet.
It is not wrong to say that the global economy and
production systems running in the internet. Dependence of interlinked computers
are extended from universities and a handful of global multinationals to
governments agencies, SMEs (Small and Medium Enterprise), industries as well as
military establishments. With the centralized data management and sharing
system through internet, people no longer need to keep redundant data. They can
access and manipulate their data from any location as long as they are able to
hook up to the internet. It acts as a large cloud storing all the data and
sometimes programs to manipulate data as well. We call them web applications.
Most of the big companies today, no longer put their data in
to public networks. They have their own mini networks called intranets. They
can be accessed typically by personnel from that particular organization only.
The military and financial institutions have extensive use of these types of
networks. Most of the time, a hybrid of public and private network is used by
organizations because they need a network that can be accessed by both the
insiders and outsiders of their organization on certain conditions. With
business to business communication increasing, demand for above hybrid networks
is very high.
Getting networked is an easy way to do all sorts of work
remotely. It is a platform to share ideas and to collaborate (This is the new
buzzword in the 21st century). With social networks extending friend
base, modern man is very different to what he was before the internet era. Now
there are professional networks as well, most notably the networking website
‘linkedin’ which has a user base over 277 million as of 2014. Human face to
face interaction is getting replaced with online communities, social networking
sites and video conferencing via internet.
Although we get tons of benefits from the new connected
word, very little is known about its vulnerabilities. Most of us don’t know the
fact that the computers and network links are not impenetrable and the data in
those big datacenters in which the internet resides can be stolen, lost or
taken by the government for various reasons stripping your privacy.
Stealing confidential data is not a new phenomenon for
internet. Hacking (in its simple form; unauthorized access to data in a
computer) is happening worldwide at an alarming rate ranging from accessing a
computer just for a challenge to crippling a whole corporate or government
network. You should not be surprised when you see your bank details and other
personal information gone in to a wrong hand despite of the security measures
you and your bank have taken.
Cyber terrorism is the new frontier in modern asymmetric
warfare. This new breed of terrorists are not armed to the teeth with guns, or wear
suicide bombs but professionals who can get control of a secured network and
use it for sinister purposes. Networks most vulnerable to cyber attacks are
military communication networks, utility control networks such as nuclear power
plant controlling systems, oil and gas distribution systems, airline control
systems etc. This growing threat gives a disturbing possibility of bringing a
might nation to its knees by a handful of computer hackers.
Loss of privacy is the next major disadvantage of internet.
Computer can be a really good spy device. If someone can tap in to your
computer without your knowledge, all the private information from your bank
accounts to your private photos can be stolen. Social networks such as
facebook, twitter and google plus may store even your most personal details. We
assume that with the privacy settings set correctly, no unauthorized personnel
can get in to our sensitive information but computer hackers as well as
government security agencies sometimes tap in to the vast pool of social
network data. Of course, the government may do that in the name of ‘National
Security’ as the whistle-blower Edward Snowden disclosed. United States National
Security Agency (NSA) was spying on US citizens, foreigners as well as foreign
governments. NSA’s global surveillance apparatus has its claws on profiles on
social networks to map the social connections [1].
Sometimes people may put even the most personal details in
the internet such as their relationship state, family details, intimate
photographs etc. They do not hesitate to even post their personal or family
problems in social networking sites for the whole world to see. It is a well
know fact that social networking sites contribute to collapsing of many
families and we can’t ignore their effect on cultural norms and social values
especially in a conservative country Sri Lanka.
Internet is growing and getting complex every day so are the
internet related problems. When authorities are talking measures against
ill-use of internet and other related networks, hackers are talking
counter-measures to slip through. The major problem is the lack of authority
over internet. It is on its own so there is virtually no one to centrally
monitor its behavior. The only thing we can do is to take extensive safety
measures when using internet. We should be extremely conscious when we share
our personal information in social networking sites. Make sure the safety is
100% ensured in online financial transactions.
This new connected world is like a chained beast. We should get to
know a way to harness the power of this enormous creature for our benefit
without being a victim of his wrath. If all the countries get together and
create a universal governing protocol for internet and other interlinked computer
networks, we will be able to make online collaboration much more safe,
beneficial and productive.
[1] James Risen & Laura Poitras, N.S.A. Gathers Data
on Social Connections of U.S. Citizens, The New York Times, Sept. 28, 2013,
at A1.