You are on page 1of 16

Cyberspace,

Internet and
Technology

Cyberspace
The word became popular in the 1990s
Networking
Internet
Digital communication
The term cyberspace has become a conventional
means to describe anything associated with the
Internet and the diverse Internet culture.

Cyberspace
Cyberspace is the electronic medium of computer
networks, in which online communication takes place and
where as a part of social experience, individuals can interact,
exchange ideas, share information, provide social support,
conduct business, direct actions, create artistic media, play
games, engage in political discussion, and so on, using this
global network.
Cyberspace consists of
a) IT Infrastructures such as computer systems, integrated
sensors, system control networks, embedded processors
b) ?

Cyberspace
Cyberspace is defined more by the social interactions
involved rather than its technical implementation.
In their view, the computational medium in cyberspace is an
augmentation of the communication channel between real
people; the core characteristic of cyberspace is that it offers
an environment that consists of many participants with the
ability to affect and influence each other.
Virtual Space Where Internet Works and there is
Interconnection of Human Beings- through Computer
and Telecommunication-irrespective of Physical
Geography

Growth of Cyberspace
Cyberspace: Internet is spreading at an
unprecedented speed:
Electricity was first harnessed in 1831, but
it was not until 1882 that the first power
station was built. Then it took another 50
years before reaching 80 per cent of the
United States.
Radio took 38 years to be used by 50
million people.
TV took 13 years to reach 50 million
people.
Whereas, PC took 16 years to reach 50

What is Cyberspace: Main


Features
1. Just like the real world comprises the entire
earth, Cyberspace consists of the
entire virtual world.
2. The
ICTs,
Computers
and
Internet
Technology are expanding the boundaries
of Cyberspace day by day.
3. Unlike the problems in the real world, it is
very easy to roam around in the
Cyberspace
on
information
superhighways.
4. The speed is tremendous, the reach
unlimited. There is ease of entry and exit.
5. Very less resources are needed to enter

Netizens
Persons in Cyberspace are called Netizens.
Sometimes referred to as cybernauts.
Anyone who is associated with computers, IT and Internet.
School has uniform
Code of shared rules and ethics mutually beneficial for all to
follow, referred to as cyberethics.
Such moral responsibilities go hand in hand when working
online with global networks, specifically, when opinions are
involved with online social experiences.

Hacking
Obsessive use of computers
Unauthorized access and use of
networked computer systems
Electronic Breaking and Entering
Accessing without stealing nor damaging

Cracker (black hat or dark side


hacker)
Maintains knowledge of vulnerabilities
for private advantage

Common Hacking Tactics

Common Hacking Tactics

Denial of service
Scans
Sniffer
Spoofing
Trojan Horse
Back doors
Malicious applets
War dialing
Logic Bombs
Buffer overflow
Password crackers
Social Engineering
Dumpster Diving

Security from Cyber Crime

Cyber Theft

Most involve theft of money


Inside jobs
Unauthorized activity
Attacks through the Internet
Most companies dont report

Cyber-terrorism
Use IT to attack electronic infrastructure,
exchange information or make threats
Terror related
More political motivation than criminal

Examples
Attempt to disrupt life support at Antarctic
research station
Release of untreated sewage in Australia
Shut down of government network and banks
in Estonia
Non-deliberate shut down of systems at
nuclear reactor

Software Piracy
Unauthorized copying of computer
programs
Licensing
Purchase payment for fair use
Site license allows a certain number of
copies
Shareware allows copies
Public Domain not copyrighted

Software industry losses


to of revenues
Millions of copies in educational market
90% pirated software in China
Sales negligible

Theft of Intellectual Property


Intellectual Property
Copyrighted material
Music, videos, images, articles, books,
software

Copyright Infringement is Illegal


Easy to trade pirated intellectual property

Publishers Offer Inexpensive Online


Music
Illegal downloading is declining

Viruses and Worms


Viruses must be inserted into
another program
Worms can run unaided
Spread annoying or destructive
routines
Commonly transmitted through
Internet and online services
Email and file attachments
Disks from contaminated computers
Shareware

Adware and Spyware


Adware
Useful software allows ads without consent

Spyware

Type of Adware
Can steal private information
Add advertising links to Web pages
Redirect affiliate payments
Change a users home page and search settings
Make modem call premium-rate numbers
Leave security holes that let Trojans in
Degrade system performance

Removal often not completely


successful

You might also like