Essay On Communication In The 21st Century

1330 Words6 Pages
In the 21 century communication is the key to daily life. Without communication many of us would feel paralyzed. The source of the communication and key to the information age is the internet. It supplies nearly 100% of the communication for the 21st century. By understanding the building blocks of the internet, and software vulnerabilities it will allow you to better understand communication in the 21st century. How we communicate on the internet Communication on the internet has allowed to what took months into seconds. We no longer have to communicate through the slow pace of mail sometimes taking months if you were to send it across the ocean. Consequently, the weeks of waiting for your mail to communicate with your loved ones…show more content…
P2P vs the traditional client/server allows the users to communicate directly with one another by transferring files directly to each other. Therefore, it cuts out the middleman between the client and server. Nonetheless, client server methods still dominate the internet. Not only are more efficient in gaining access to files from another network, and Client/Server connections allows on demand connections. Software application vulnerabilities in browsers. Vulnerabilities within software applications and browsers allows has the potential to allow unauthorized access to one’s network. Over the past year there has been many vulnerabilities that shocked the cybersecurity community. For example, the Samba cry vulnerability, Eternalblue exploit written by the nsa, and most recently the Meltdown vulnerability that came out at the beginning of this year. These software vulnerabilities can be detected through a process that is known as fuzzing. Fuzzing will throw bits of data at the application hoping for a crash ,and some of the data that crashes will lead to the data being overwritten. With that data being overwritten it will allow hackers to write an exploit based off the crash and ultimately allow them to gain access to your system. Several examples of exploitable vulnerabilities
Open Document