Professional Documents
Culture Documents
Internet and
Technology
Cyberspace
The word became popular in the 1990s
Networking
Internet
Digital communication
The term cyberspace has become a conventional
means to describe anything associated with the
Internet and the diverse Internet culture.
Cyberspace
Cyberspace is the electronic medium of computer
networks, in which online communication takes place and
where as a part of social experience, individuals can interact,
exchange ideas, share information, provide social support,
conduct business, direct actions, create artistic media, play
games, engage in political discussion, and so on, using this
global network.
Cyberspace consists of
a) IT Infrastructures such as computer systems, integrated
sensors, system control networks, embedded processors
b) ?
Cyberspace
Cyberspace is defined more by the social interactions
involved rather than its technical implementation.
In their view, the computational medium in cyberspace is an
augmentation of the communication channel between real
people; the core characteristic of cyberspace is that it offers
an environment that consists of many participants with the
ability to affect and influence each other.
Virtual Space Where Internet Works and there is
Interconnection of Human Beings- through Computer
and Telecommunication-irrespective of Physical
Geography
Growth of Cyberspace
Cyberspace: Internet is spreading at an
unprecedented speed:
Electricity was first harnessed in 1831, but
it was not until 1882 that the first power
station was built. Then it took another 50
years before reaching 80 per cent of the
United States.
Radio took 38 years to be used by 50
million people.
TV took 13 years to reach 50 million
people.
Whereas, PC took 16 years to reach 50
Netizens
Persons in Cyberspace are called Netizens.
Sometimes referred to as cybernauts.
Anyone who is associated with computers, IT and Internet.
School has uniform
Code of shared rules and ethics mutually beneficial for all to
follow, referred to as cyberethics.
Such moral responsibilities go hand in hand when working
online with global networks, specifically, when opinions are
involved with online social experiences.
Hacking
Obsessive use of computers
Unauthorized access and use of
networked computer systems
Electronic Breaking and Entering
Accessing without stealing nor damaging
Denial of service
Scans
Sniffer
Spoofing
Trojan Horse
Back doors
Malicious applets
War dialing
Logic Bombs
Buffer overflow
Password crackers
Social Engineering
Dumpster Diving
Cyber Theft
Cyber-terrorism
Use IT to attack electronic infrastructure,
exchange information or make threats
Terror related
More political motivation than criminal
Examples
Attempt to disrupt life support at Antarctic
research station
Release of untreated sewage in Australia
Shut down of government network and banks
in Estonia
Non-deliberate shut down of systems at
nuclear reactor
Software Piracy
Unauthorized copying of computer
programs
Licensing
Purchase payment for fair use
Site license allows a certain number of
copies
Shareware allows copies
Public Domain not copyrighted
Spyware
Type of Adware
Can steal private information
Add advertising links to Web pages
Redirect affiliate payments
Change a users home page and search settings
Make modem call premium-rate numbers
Leave security holes that let Trojans in
Degrade system performance