Internet was built in order to provide full access from anywhere. When DARPA funded the development of internet, it was trying to assure that the destruction of a centralized computing center would never avoid a fast response to a nuclear attack from the enemy. Those engineers were searching for a network configuration that could provide fast reconfiguration. TCP/IP protocols were born in this way. The TELNET standard was created in order to have a direct link to remote computer as if the operator was in front of the mainframe. However, nowadays, the port 23 is usually blocked by most firewalls.
TELNET protocol is not commonly used due to its lack of encryption. Different protocols were developed later as SSH. More complex and secure protocols can be used instead. On the other hand, text terminals are a reminiscence of the past, now people use graphic interfaces instead. Sometimes it is interesting to review the history in order to understand which one is the true aim of many things before criticizing them.
Modern people consider computer security as a defense tool; however, remote access was conceived as a defense tool. From a military viewpoint, connectivity, instead of firewalling, is a defense tool in a nuclear world. A firewall is similar to a company of soldiers defending a nuclear silo. It is not defending directly our lives but protecting a deterrence weapon.
This discussion is very interesting because in the civil world we are very worried due to data hacking; however, we do not care about the effects of a lack of connectivity. Modern societies have usually got a lot of people in the streets demanding more security; however, security is provided by connectivity and the access to information. For instance, a piece of fake news is not a problem by itself. The problem of fake news is that corrupted or manipulated information is equivalent to unavailable information. Democracy resides on proper information for voters. Majorities can never be owners of the truth if they have not a proper access to the full real information. In a competitive world deception is used many times to increase the competitiveness, and information analysis instead of direct assumptions is required to assure that managers are making the best decisions. In a business, management, data analysis and decision making techniques are required in order to drive a company. The complexity of problems and the competitive environment produce that better decisions are made by experts instead of a majority of employees.
The higher the number of people accessing to computer system the higher the probability that information can be hacked and got illegally or corrupted. Limiting the access to information we are increasing the security of the system, but we are limiting its functionality. Encrypted access to computer systems introduces an additional advantage: Encrypted communications are less hackable and they can provide a way of authentication of the identity of the user better than a simple password. The use of encryption systems lets to increase the number of users without a huge increase of the probability of hacking. Connectivity can be preserved through encryption systems because it makes more difficult the hackers’ activity, but the cost of the computer system and its maintenance is higher and it requires specialized personnel with higher qualifications.