The online student news source of Lovejoy High School

The Red Ledger

The online student news source of Lovejoy High School

The Red Ledger

The online student news source of Lovejoy High School

The Red Ledger

Global vulnerability through technology

Students+using+computers+and+cell+phones+in+class+to+aid+learning.+
Riley Laurence
Students using computers and cell phones in class to aid learning.

The internet was hailed as one of the greatest things to ever grace the face of society. Finally, humankind could know everything in an instant, find groups in a heartbeat, and immerse themselves in a new age of innovation before the eye could blink.

Soon, humanity began to disperse its resources upon the vast space available on its new data networks. Knowledge was posted for all, computers began to pop up in more and more residences across the globe, and soon enough, statistics on development were measured in terms of people with internet access.

There were minor bursts of trouble, of course. Bandwidth had to be expanded to accommodate the flooding stream of new users. People discovered what the word “privacy” truly meant only after it had become a fleeting memory. And digital security had to meet its first new challenges of protecting the treasure trove of knowledge and information stored in the nets. But overall, everything looked great for this little race of people plodding along with its new toys.

And then the Heartbleed came. A vast coding error had penetrated to the field of thought, hinting at the danger of the scattered coding systems. Emergencies were declared. Teams were assembled. Advisories to change passwords were made. The error exposing system information was neutralized. And humanity moved on from its warning.

But it was only to have the problem return again in greater force than before. Rated as a ten (out of ten) on the scale of vulnerabilities, the recently discovered Shellshock bug is labeled as more serious because it gives intruders a way to actually take control of target systems by exploiting a flaw in Bash software components, commonly found in Linux and Mac operating systems.

Technology has given humankind incredible new advancements and ways to disseminate research. But it has come at a price, for as more and more data is stored in computers or online, the temptation of theft becomes ever higher. As global communication and business rely more upon the new systems, populations remain vulnerable to the consequences of what would happen if the networks did fail and all the data was left unprotected.

One doesn’t know what they have until it is gone.

By no means does this event mean humanity shouldn’t use technology. However, it does mean vulnerabilities must be fixed. The coding has to be more thorough. The field of digital security has to become a serious endeavor. Education and history can help with that as technology classes become more prevalent, giving society more people who could potentially go into code development, and as students discover a need for greater information protection as hackings such as Target’s continue to make headlines.

And of course, even now, work is being done to quickly patch the problem. More advisories are being sent out. Repairs and warnings are underway. Estimates are being revised as the problem is more understood. But the key question remains:


Will humanity learn from its weaknesses this time?

Leave a Comment
More to Discover
About the Contributors
Noah Corbitt
Noah Corbitt, Staff Reporter/Copy Editor

Noah Corbitt is a new staff member whose initial observance of the “high school experience” has left him constantly counting down the days until he gets a break by holiday or snow flurry. He thoroughly enjoys deciphering the stories of old wars and political agendas, and will gladly spend many a period debating his stances to you from surface to thesis (yes, he is taking debate). But don’t be fooled, his range of interests lies far beyond just connections of events, and his personality far beyond academia, for not only does he enjoy reading and writing creative works, but he is also an avid football fan and will happily devote his entire weekend to following the various leagues around the country: national, collegiate, and high school. He also loves a good story, and will therefore judge both his new video games and books on plot and theme. If they pass, he will lose his life for a couple of weeks obsessing about and roaming his latest addicting environment. Already intrigued by the concept of a snack cabinet, he is waiting in suspense to see what life (and newspaper) will throw at him this year.

Riley Laurence
Riley Laurence, Opinion Editor
The rumors are true; Riley Laurence has agreed to give The Red Ledger one last shot. Entering his third consecutive year, Riley is still avoiding social interaction at all costs and drinking an unhealthy amount of Dr. Pepper every day. Riley is a Certified Sno Technician at Bahama Bucks and will not hesitate to go to Chick-fil-a at any given opportunity. He knows every Spongebob episode forwards and backwards and no matter how many people try and stop him, he is probably going to re-watch How I Met Your Mother at least twice before graduation.  Despite his attendance history, he has just set a new personal record (5 days) for "Most Days Consecutively Attending School" and is awaiting his honorary plaque. The left side of Riley's bottom lip is paralyzed due to a tragic accident involving a cartwheel, an emergency room, and a permanently damaged facial nerve. He is currently enrolled in online aerobics and will be joining the bowling team because he put off taking an athletic credit until his senior year. All-in-all, Riley is pretty psyched to start his last year of high school as a member of the talented The Red Ledger staff. You can follow Riley on Twitter at @rileylaurence.

Comments (0)

The Red Ledger values the opinion of its readers and encourages them to discuss its content. All comments are subject to approval by The Red Ledger staff. The Red Ledger does not allow anonymous comments and requires a valid email address. The email address will not be displayed but will be used to confirm your comments. Comments are reviewed as often as possible. Comments with inappropriate content will not be published. Once submitted, comments become the property of The Red Ledger. To see our full Comment Policy, visit https://www.theredledger.net/about-us/policies/
All The Red Ledger Picks Reader Picks Sort: Newest

Your email address will not be published. Required fields are marked *