Which factor is most responsible for ongoing challenges in internet security as discussed in the lecture?