Page 76 - 2022-2023 Creative Writing
P. 76

Internet





            Ever since the dawn of mankind, people sought after ever more advanced methods to send, receive, share

        and interpret information. At first, we started using our tongues, mouths and vocal chords to articulate sound

        to create language, in order to pack as much information into our primitive conversation. Fires, pigeons, letters,
        books, telegrams and radios all came after it. The latest addition to this party, the internet is what we're

        destined to embrace now.


             I cannot agree that its problems in security outweigh the outstanding advantages it has over our lives.


        The first obvious reason is the general advantages of the internet such as the access to the pool of information

        we've garnered over the years and the instant messaging system that allows us to be in touch at every nick of
        time. On top of that, the security risks mentioned can be easily avoided with little knowledge given. Avoiding

        sketchy websites and only getting service from secure, verified websites are a great ruleset for most people.
        Skepticism should always be at the forefront on the internet as there are many people who want to take

        advantage of you. Furthermore, according to my experience, an average consumer on the internet would not be

        bothered much about the security of their personal information if they have not made it public on social media
        sites in the first place. Unless a person specifically chooses to disclose their information, their data is considered

        to be in safe places.



            Another point is that only prolific individuals and organizations are targeted specifically in serious online

        criminal acts. The amount of attention they manage to accumulate is the factor for the attacks targeted
        towards them. Even these attacks can and will be countered by investments into data security and the

        development of better security programs. However, some organizations can work their way around this by

        requesting the device used to access the site for personal data. An example is Facebook having access to
        smartphone's contact data that can create shadow profiles which are collected in databases. Although

        unwanted, this data collection is in my opinion nothing more than a massive collection of phone numbers. Who

        knows if it's for the good or not? On top of that, since the vast majority of what we call the internet is owned
        by major corporations, I feel that there is not much a person can do against them except for just not using it.

        Plus, in this free world, a competitive market ensures a kind of natural selection to sort out the best and
        brightest of the platforms to be used for consumers worldwide.


         Hopefully in this process, the security and management investments of companies are taken into consideration.




                                                                                                            12A Erkhembayar .L
   71   72   73   74   75   76   77   78