The Internet has presented unprecedented opportunities, which were unimaginable in the not so distant past. Presently human reliance on the Internet spans across all forms of society and interaction, from commerce, infrastructure, and defense (Shandler et al., 2018). Access to the Internet today can be considered as a human right. For one to fully function in society, it is a necessity. When people’s dependence on Internet connectivity to work as a part of society increases, their susceptibility to cyber-attack and lack of Internet escalates as well. This contradiction of dependency and weakness requires a new paradigm for interpreting the physical, ethical, and legal consequences (Overview of Cyber Vulnerabilities | CISA, 2020). This point explains why cybersecurity experts are crucial today.
A certain pedigree of knowledge and expertise is vital when understanding and developing security measures on the Internet. The Internet is dynamic; it changes daily as new and improved methods of relaying information are generated. These developments tag along with them their particular security issues, some more susceptible than others (Ertan et al., 2020). A cybersecurity graduate from this university is equipped with the necessary tools and know-how to adapt to the accruement developments. Cybercriminals utilize sophisticated methods to pirate and traffic data across the web (Overview of Cyber Vulnerabilities | CISA, 2020). As a graduate of the university, a cyber-security agent can quickly determine and mitigate them.
I have studied cybersecurity at different levels in different countries. The wealth of experience garnered from learning from various institutions cannot be overlooked. Cybersecurity threats can be unique to a particular region due to the type of online infrastructure in use (Ertan et al., 2020). Attaining a degree from this university ascertains the culmination and knowledge I have obtained on the cybersecurity threats in this area. My first degree from Nigeria is also a testament to my expertise in the nation's cybersecurity scene. My master's degree from the United Kingdom further reinforces my claims to cybersecurity agency; a Ph.D. will undoubtedly be the crown certification that helps me towards my goal in ensuring information safety.
Nigeria is ranked as one of the top ten countries where cybercrimes are most prevalent. The country is a primary location of fraud emails and phishing. Many young tech-savvy Nigerians have dedicated themselves to fraudulent online schemes (Red24 2015, 2014). These criminals have severely handicapped the country’s reputation in online forums. This handicap has deterred online-based firms that would be influential in the development of the country from investing in Nigeria (Okeshola & Adeta, 2013). A degree in cybersecurity from this university should go a long way in assisting me in alleviating this nationwide concern. As a graduate of this university, it would be possible to collaborate with the Nigerian government and develop effective countermeasures against these criminals.
The importance of developing profound and effective countermeasures against the rise of cyber-crimes is restricted to Nigeria and is a worldwide concern (Red24 2015, 2014). Cybercrimes can take on numerous forms, from phishing, identity theft, cyberstalking, and invasion of privacy (Schandler, 2018). These online crimes have only gone up in degree; today, even terrorists have begun employing cyber-attacks. The urgency for having well-equipped cybersecurity agents has never been higher. Attaining a degree from this university will allow me to use my skills in the battle against these online criminals and cyber terrorists. The Internet has presented an infinite number of possibilities for the betterment of humankind. However, with no exclusivity, it has proved to be a double-edged sword with criminals now hiding behind screens and keyboards. A doctorate from the university gives me the power to become the shield that defends the ethical use of the Internet for the good of all and sundry.
References
Ertan, A., Crossland, G., Heath, C., Denny, D., & Jensen, R. (2020). Cyber security behaviour in organisations. ArXiv.Org. https://arxiv.org/abs/2004.11768
Okeshola, F., & Adeta, A. (2013). The nature, causes, and consequences of cyber crime in tertiary institutions in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research, 3(9). http://www.aijcrnet.com/journals/Vol_3_No_9_September_2013/12.pdf
Overview of cyber vulnerabilities | CISA. (2020). Us-Cert.Gov. https://www.us-cert.gov/ics/content/overview-cyber-vulnerabilities
Shandler, R., Daphna Canetti, & Gross, M. L. (2018, March 21). Internet reliance: A social and legal analysis of internet access as an auxiliary human right. ResearchGate; unknown. https://www.researchgate.net/publication/323918165_Internet_Reliance_A_Social_and_Legal_Analysis_of_Internet_Access_as_an_Auxiliary_Human_Right
Red24 cybercrime top 10 countries where attacks originate 2015. (2014). https://www.bba.org.uk/wp-content/uploads/2015/02/red24+Cybercrime+Top+10+countries+where+attacks+originate+-++2015.pdf
Cite this page
Essay Example on Internet Dependence: A Human Right & Necessity in Today's Society. (2023, Sep 19). Retrieved from https://proessays.net/essays/essay-example-on-internet-dependence-a-human-right-necessity-in-todays-society
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Punishment and Society
- The People of the State of New York v. Thomas Morrison and James Durkin
- Introduction to Computer Security - Essay Sample
- Paper Example on Blood Sampling in Forensic Analysis: Desiccated Blood Samples
- Essay Sample on Cybersecurity Attacks and Defense Modeling
- Cyberstalking: Fraud, False Allegations & Threats - Essay Sample
- Victim Services and Courts - Essay Sample