วันจันทร์ที่ 30 มกราคม พ.ศ. 2555

Chapter.10 Pros And Cons of Information Technology / Advantage and Disadvantage of IP

Information Technology Pros
1. The world got flexibility
 What we think, do or plan must be shared with our co-workers, colleagues and friends. The internet technology has advanced this system to a great extent. The telephone idea (by Alexander Graham Bell) has been modified and made as Cell Phones to increase more flexibility in communication and talk to our dear fellows whenever we require!

2. The sense of responsibility has increased
Let us take ‘Barack Obama- USA President’ as the figure. With the use of networking sites (Twitter and Facebook), blogs, social bookmarking, the leader can approach to the world whenever necessary and we can receive the news and updates which he has done (or wants to be done by us) within a very short period.

3. Easy thinking & evolution in transportation

To think and to research, we need resources to find what our past people has thought, what quotes they have left for us (+information + theory). We can find them by a single click in search engines (specially Google, Yahoo!). By getting a clear cut idea, we get the chance of contributing the world with new technological ideas and inventions and share what we have learnt throughout our lives.
And throughout the ages, it helped us to evolute the transportation strategy which helps us to visit from a place to another by (Roads, highways, air, water and in the skies!)

4. Saves thousand of lives daily
So, by the point heading I hope you understand I am referring towards Medical Sector development. Each day people are getting relief by the perfect use of Medicine, Hospital Technology with addition of (X-Rays, Laser Treatments) and more on the queue. By the combination of the World Health Organization, various fatal diseases can be overcome and just expelled from specified countries by quick plans and ideas.

5. Increase the sense of Human Rights
The technology can remind of our human rights, basic needs and give updates where relief or worldwide help is necessary. During earthquakes, terrible floods, while co-operation is necessary the World Wide Web can help us to collect the donation by a desired amount.
It is not possible to just figure out everything about the good and bad sides of Information and Technology within a page and article as because it has mixed with every aspects and corners of our lives. Rather, let us look at the side effects, bad sides (cons) which IT-sectors have brought to the Human Society.

Information Technology Cons
1. It has taken away people’s Privacy 
As IT-Sectors have wined the people’s heart worldwide. People are here to share and store any kind of information, private date in their hard drives and private online databases. But due to some Cyber-Criminals, nothing is SO Safe both online and offline. If someone becomes a bit careless, s/he may needs to pay high for it. (It’s serious).

2. The online community is not safe for Family anymore
Children under age may often share Cell Numbers, Private Email Address which can be hacked by people and can pass it to the criminals who have a blue-print to harm the society. And people are loosing credit card privacy and other payment processing options. Again, there are some sites created by Nasty Guys, which can lead under eighteen teenagers to a different path – That Is Going To Bring Harms To The Nation.

3. It is going to damage a Human’s Natural Power
We can think, gather human principles (ethical knowledge) and make co-operative relationships between friends and families. But due to harmful aspects of (IT) people are becoming fully technological based. And it can bring huge damage to the society as its taking away the natural thoughts and organic ideas.

4. It can bring World Destruction without Efficient Administration
This is an extra point which I am writing by remembering various Science Fictions. Great scholars have though about the matter wisely. Til now, we (humans) are possessing the leading place in the world and administering the computer technology. But a day MAY come when the technology is going to administer us in all aspects. It may probably happen that we are converted to the slaves of Technology.
So, by this cons I am not trying to tell that Technology is here to bring harms only, because I myself is a technological man who passes 24 hours browsing computer and talking on phones. But as a part of human society we need to give up a look at the both sides of IT.

The Advantage of Using IP

IP enables cross-platform, or heterogeneous, networking. For example, a Windows NT/2000 network could contain Unix and Macintosh workstations or even networks mixed in it. TCP/IP also has the following characteristics:
  • Good failure recovery
  • The ability to add networks without interrupting existing services
  • High error-rate handling
  • Platform independence
  • Low data overhead
Because IP was originally designed for Department of Defense–related purposes, what we now call features or characteristics were actually design requirements. The idea behind "Good Failure Recovery" was that if a portion of the network were disabled during an incursion or attack, its remaining pieces would still be able to function fully. Likewise is the capability of adding entire networks without any disruption to the services already in place. The ability to handle high error rates was built in so that if a packet of information got lost using one route, there would be a mechanism in place to ensure that it would reach its destination using another route. Platform independence means that the networks and clients can be Windows, Unix, Macintosh, or any other platform or combination thereof. The reason IP is so efficient lies in its low overhead. Performance is key for any network. IP is unmatched in its speed and simplicity.

Disadvantage of Internet Protocol 

1. SYN Attacks
  • The Internet Protocol uses a three-way handshake system. Under this system the user contacts a server, which then sends a response back to the user asking the user to confirm the connection. The computer hosting the connection must then wait 75 seconds to receive a response to the acknowledgment, to compensate for network slowdown. SYN attacks work by sending the first request but not the second over and over again. This monopolizes the computer's resources, causing other legitimate connections to fail.

2. Sequence Manipulation

  • The Internet Protocol keeps packets of information in sequence. If a user goes offline, either by a malicious user's designs or other means, any computers it is currently communicating with will close the connection if a response without the proper sequence number is received. If a user intercepts these messages he can discern the ID number and respond as the user, resulting in communication with the machine being hijacked. This can cause theft of important data.

3. Amorphous Identification

  • The Internet Protocol was designed to only allow a single connection at a time and to have this connection be routed to a definite user. As the Internet has progressed and IP address space becomes increasingly precious, this address space is no longer dedicated and is usually assigned among a pool of users. This lack of unique identification makes it hard to verify a user and adds to the complexity of an application's security by removing trust in the identity of the user.

4. DNS Flaws

  • The Domain Name Service (DNS) is a way of looking up the IP address of a domain name. Internet Protocol can only communicate to IP addresses, requiring Internet communication to occur through a DNS server maintained by your Internet Service Provider. This flaw can be exploited by redirecting domain names to different IP addresses.

 REFERENCE

ไม่มีความคิดเห็น:

แสดงความคิดเห็น