Table of contents
1.
Introduction
2.
Internet 
3.
Features Of Internet 
4.
Role Of Internet In Information System 
5.
Drawbacks Of Internet 
6.
Basic Features To Ensure The Security 
7.
FAQs
8.
Key Takeaways 
Last Updated: Mar 27, 2024
Easy

INTERNET and its Importance in Information System

Career growth poll
Do you think IIT Guwahati certified course can help you in your career?

Introduction

The Internet is a computer network interconnection system that connects billions of devices worldwide. It is a global network of networks made up of millions of non-public, public, academic, business, and government packet-switched networks linked together by a diverse set of electronic, wireless, and optical networking technologies.

 

The Internet allows you to access almost any information, communicate with anyone in the world, and do a lot more. All of this is possible by connecting a computer to the Internet, also known as going online

You must have noticed the signs to know whether the other person is online or offline. 

On social applications, the green color depicts that the other person is online, which means connected to the Internet. For example, on Whatsapp, the double ticks depict the person is connected to the Internet.

Source: meme.org

Seems interesting right? So, in this article, we’ll be briefly looking at the role of the Internet, its benefits and drawbacks, and most importantly its importance in Information Systems. 

Internet 

The internet is a larger network that allows computer networks run by companies, governments, universities, and other organisations all over the world to communicate with one another. As a result, there is a tangle of cables, computers, data centers, routers, servers, repeaters, satellites, and wifi towers that allow digital data to travel around the world.

It is that infrastructure that allows you to order your weekly groceries, share your life on Facebook, watch Outcast on Netflix, take courses from CodingNinjas, and search the web for how to crack the interviews for the tech-giants. To be precise, anything is possible by using the Internet. 

Now, it is very interesting to know how big is the Internet? So, let’s explore it. 

How big is the Internet?

One metric is the amount of data that passes through it each day, which is approximately five exabytes. That's 40,000 two-hour standard definition movies per second.

Ohio, such a big number.

Source: The Conversation

It takes some tinkering. Hundreds of thousands of miles of cable cross countries, with more being laid along sea floors to connect continents and islands. The modern internet is supported by approximately 300 submarine cables, the deep-sea variant of which is only as thick as a garden hose. Most are made up of bundles of hair-thin fibre optics that transmit data at the speed of light.

Features Of Internet 

  • One of the supreme features of the Internet is the ability to communicate with anyone in the world almost instantly. Email is one of the earliest and most widely used methods of communication and information sharing on the Internet, with billions of people using it. People can use social media to connect in a variety of ways and to form online communities.
  • There are numerous other activities available on the Internet. There are thousands of ways to stay up to date on news or shop for anything on the internet. You can manage your bank accounts, pay your bills, meet new people, watch TV, or learn new skills. Almost anything can be learned or done online.

Some other functionalities are:

Accessibility

The Internet is a global service that is available to everyone. People in remote parts of an island or the interior of Africa can also access the Internet.

Simple to Use

The software used to access the Internet (web browser) is designed to be simple; thus, it is simple to learn and use. 

Other Media Interaction

The Internet has a high level of interaction with other media. News and other magazine publishing houses, for example, have expanded their business with the help of Internet services.

Low Price

The cost of developing and maintaining an Internet service is relatively low.

Security

Last but not least, Internet access has aided the security system at both the individual and national levels through the use of components such as CCTV cameras, etc.

Role Of Internet In Information System 

Because of its fundamental characteristics such as widespread usability and access, the Internet has enabled entirely new forms of social activities, interaction, and organisation. Social networking sites like Twitter, Facebook, and MySpace have introduced new ways to socialise and interact.

Users of these sites can add a wide range of information to their pages, pursue common interests, and connect with others. It is also possible to locate pre-existing acquaintances and facilitate communication among pre-existing groups of people. Sites such as Linked In facilitate commercial and business connections. Users' videos and photographs are the focus of YouTube and Flickr.

It is possible to receive/transmit information containing images, graphics, sound, and videos using the internet. The ISP (Internet service provider) industry can provide the following services:

1. Using the internet to connect consumers and businesses.

2. Monitoring and upkeep of customers' websites.

3. Network administration/systems integration.

4. Access to the Internet backbone for other ISPs.

5. Overseeing online purchasing and payment systems

The internet is designed to be infinitely expandable, and its dependability is primarily determined by the quality of the service providers' equipment.

Drawbacks Of Internet 

Along with the good side of the Internet, there are equivalent drawbacks that can be very harmful if not taken care of correctly. 

Source: SocialBee

Some of the drawbacks are: 

Virus Threat â€“ A virus is a program that corrupts the operation of computer systems. It enters the system via the Internet and has the potential to crash the entire system in seconds. Viruses and malware spread quickly over the Internet, and the device's entire data set can be corrupted. Many multinational corporations have suffered massive losses in the past as a result of viruses in the system. Cybersecurity is one of the biggest concerns confronting the IT department today. Many countries have enacted specific legislation to address the issue, but everything appears to be far-fetched today.

Spam – Unwanted emails, advertisements, and so on are sometimes referred to as spam because they require the ability to disrupt the system.

Personal Information Theft – When people use social networking websites or online banking services, they enter personal information such as their email ID, bank account number, credit card number, phone number, and so on. A software expert or a hacker can easily retrieve this information and cause massive damage to the users. A hacker creates a malicious virus that infiltrates the computer system and destroys valuable data.

As security is a big concern, let us have a look at some basic features to ensure Security: 

Basic Features To Ensure The Security 

  1. Confidentiality: The goal of 'Confidentiality' is to protect data by preventing unauthorised information disclosure. Only individuals with legitimate authorization to access the required information should be granted access, also known as "need to know" permissions. In general, the goal of confidentiality is to keep sensitive information out of the hands of the wrong people.
    Multi-factor authentication, strong passwords, encryption, data segregation, and assigning appropriate user privilege levels are some of the measures that can be considered to help with confidentiality. However, before implementing such measures, it's critical to categorise your information assets based on how much damage they could cause if accessed by an unauthorised entity. 
    The greater the negative impact, the tighter the security controls must be.
    Eavesdropping attacksencryption crackingmalicious insiders, and man-in-the-middle attacks are all common threats to confidentiality.
  2. Integrity: This principle aims to ensure the accuracy, dependability, and validity of information throughout its life cycle. Since the information only has value if it is true, effective measures must be put in place to prevent unauthorised individuals or processes from altering data at rest or in transit.
    Regular backups, as well as effective access privileges, version controls, and input validation, are required to prevent unwanted modifications and ensure that information can be restored if it is altered.
    The following issues could jeopardise the integrity of your data:
    Human error, Compromise of a server in the absence of end-to-end encryption, Physical compromise of a device.
  3. Authentication: The process of recognising a user's identity is known as authentication. It is the process of matching an incoming request with a set of identifying credentials. The provided credentials are compared to those on a file in a database containing the authorised user's information within an authentication server or on a local operating system. 
    The authentication process is always run at the beginning of the application, before the permission and throttling checks, and before any other code is allowed to run. To verify a user's identity, different systems may require different types of credentials. The credential is frequently in the form of a password, which is kept private and is known to the individual and the system. We can use One-time Passwords, Digital Signatures, Digital Certificates, and other methods to achieve authentication.

FAQs

  1. Which one is more important, confidentiality or integrity?
    When the value of the information relies on limiting access to it, the CIA triad goal of confidentiality takes precedence over the other goals.
  2. What is the distinction between confidentiality and authenticity?
    Both are distinct in the sense that authentication is the process of proving you are who you claim to be. Confidentiality is in place to ensure that no one else has access to the information.
  3. Can you have confidentiality without integrity?
    No system can provide confidentiality if it lacks integrity. If the integrity is not maintained, the existence of the information may be revealed, jeopardizing confidentiality.
  4. What are the security precautions taken when using the internet?
    1) Create strong passwords. 2) Install a firewall. 3) Consider antivirus software. 4) It is critical to keep your information up to date. 5) Make backups a priority. 6) Consistently monitoring and many more. 
  5. Who invented the internet?
    Computer scientists Vinton Cerf and Bob Kahn are credited with developing the Internet communication protocols that we use today and the system referred to as the Internet.

Key Takeaways 

In this article, we have extensively discussed the Internet, its features, and most importantly its importance in Information Systems followed by some drawbacks. At last, we discussed the basic measures to ensure the security of your data. 

We hope that this blog has helped you enhance your knowledge regarding the Internet and its importance, and if you like to learn more, check out our articles

You can also refer to these articles to enhance your knowledge - Security Goals, Cyber security Technology, Types of cyber attackers, and many more. 

Do upvote our blog to help other ninjas grow. 

HAPPY LEARNING NINJA :)

Live masterclass