Book contents
- Frontmatter
- Contents
- Preface
- A quick tour through the book
- Acknowledgments
- Prologue: Blog entry from Jonathan Hey
- 1 Beginnings of a revolution
- 2 The hardware
- 3 The software is in the holes
- 4 Programming languages and software engineering
- 5 Algorithmics
- 6 Mr. Turing’s amazing machines
- 7 Moore’s law and the silicon revolution
- 8 Computing gets personal
- 9 Computer games
- 10 Licklider’s Intergalactic Computer Network
- 11 Weaving the World Wide Web
- 12 The dark side of the web
- 13 Artificial intelligence and neural networks
- 14 Machine learning and natural language processing
- 15 The end of Moore’s law
- 16 The third age of computing
- 17 Computers and science fiction – an essay
- Epilogue: From Turing’s padlocked mug to the present day
- Appendix 1 Length scales
- Appendix 2 Computer science research and the information technology industry
- How to read this book
- Notes
- Suggested reading
- Figure credits
- Name index
- General index
12 - The dark side of the web
Published online by Cambridge University Press: 05 December 2014
- Frontmatter
- Contents
- Preface
- A quick tour through the book
- Acknowledgments
- Prologue: Blog entry from Jonathan Hey
- 1 Beginnings of a revolution
- 2 The hardware
- 3 The software is in the holes
- 4 Programming languages and software engineering
- 5 Algorithmics
- 6 Mr. Turing’s amazing machines
- 7 Moore’s law and the silicon revolution
- 8 Computing gets personal
- 9 Computer games
- 10 Licklider’s Intergalactic Computer Network
- 11 Weaving the World Wide Web
- 12 The dark side of the web
- 13 Artificial intelligence and neural networks
- 14 Machine learning and natural language processing
- 15 The end of Moore’s law
- 16 The third age of computing
- 17 Computers and science fiction – an essay
- Epilogue: From Turing’s padlocked mug to the present day
- Appendix 1 Length scales
- Appendix 2 Computer science research and the information technology industry
- How to read this book
- Notes
- Suggested reading
- Figure credits
- Name index
- General index
Summary
When he later connected the same laptop to the Internet, the worm broke free and began replicating itself, a step its designers never anticipated.
David E. SangerBlack hats and white hats
As we have seen in Chapter 10, the Internet was invented by the academic research community and originally connected only a relatively small number of university computers. What is remarkable is that this research project has turned into a global infrastructure that has scaled from thousands of researchers to billions of people with no technical background. However, some of the problems that plague today’s Internet originate from decisions taken by the original Internet Engineering Task Force (IETF). This was a small group of researchers who debated and decided Internet standards in a truly collegial and academic fashion. For a network connecting a community of like-minded friends and with a culture of trust between the universities, this was an acceptable process. However, as the Internet has grown to include many different types of communities and cultures it is now clear that such a trusting approach was misplaced.
One example is the IETF’s definition of the Simple Mail Transfer Protocol (SMTP) for sending and receiving email over the Internet. Unfortunately, the original SMTP protocol did not check that the sender’s actual Internet address was what the email packet header claimed it to be. This allows the possibility of spoofing, the creation of Internet Protocol (IP) packets with either a forged source address or using an unauthorized IP address. Such spoofing is now widely used to mask the source of cyberattacks over the Internet, both by criminal gangs as well as by governments.
- Type
- Chapter
- Information
- The Computing UniverseA Journey through a Revolution, pp. 243 - 262Publisher: Cambridge University PressPrint publication year: 2014