0% found this document useful (0 votes)
35 views7 pages

Cyberspace

Uploaded by

Ankita Pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views7 pages

Cyberspace

Uploaded by

Ankita Pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

2 Topic:

Cyber Space
3 Index

Topic Page

Introduction 4

Key features 5

Uses 6

Threats 7
4 Introduction
Cyberspace refers to the virtual computer world, and more specifically, an electronic medium
that is used to facilitate online communication. Cyberspace as a term was taken to describe
the “location” in which people interacted with each other while using the Internet.
Cyberspace typically involves a large computer network made up of many worldwide
computer subnetworks that employ TCP/IP protocol to aid in communication and data
exchange activities. Cyberspace's core feature is an interactive and virtual environment for a
broad range of participants.
In the common IT lexicon, any system that has a significant user base or even a well -designed
interface can be thought to be “cyberspace.”
5 Key features of Cyberspace:
 cyberspace is not a physical place, although many elements of cyberspace are indeed physical, do
have volume and mass., and are located at points in physical space that can be specified in three spatial
dimensions
 cyberspace includes but is not limited to the Internet — cyberspace also includes computers (some of
which are attached to the Internet and some not) and networks (some of which may be part of the
Internet and some not).
 cyberspace includes many intangibles such as information and software and how different elements
of cyberspace are connected to each other.
 Cyberspace is both a physical and virtual domain. The physical part is the millions
of networked information and communication technologies that create
& enable it: computers, servers, routers, processors, satellites, switches, and cables. The virtual part is
formed by electronic connections and by data sent between and stored in the pieces of its physical
infrastructure.
 It exists globally, created and transmitted, stored and maintained by governments, public and
private owners. Cyberspace changes and evolves as develop hardware and software technology.
 Since cyberspace is completely different from the physical world, traditional laws are not applicable
here. In order to provide cyber security to users, the government introduced several cyber laws to ensure
that people use technology and avoid its misuse.
 It is pervasive, transcending organizational boundaries and geopolitical borders and readily accessible to
almost anyone from almost anywhere in the world.
6 Uses of cyberspace:
 This is the place in which online games occur.
 It is the land of chat rooms, and the home of instant-messaging
conversations.
 Cyberspace has also become an important location for social and political
discussion, with the popular emergence in the late 20th and the early 21st
century of Web-based discussion boards and blogs.
 blogs can be seen as offering an opportunity for public discussion in
cyberspace that is not available in the off-line world.
 World Wide Web and all the popular social media and other application
use Cyberspace.
7 Threats of Cyberspace
 Cyber invasion: Cyber invasion is referred to the intrusion into networks to collect information,
but neither add or modify data nor undermine or interfere with the networks. Both
government intelligence departments and non-state actors emphasize to obtain information
from networks because it is much easier and cheaper to get information from networks than
human intelligence. Hence cyber invasions increase rapidly.
 Cybercrime: Cybercrime is referred to the use of networks to carry out criminal activities such
as spreading inappropriate or harmful contents and news, engaging in computer-related
fraud and selling illegal products by networks.
 Malware: Malware usually includes computer virus and worm, spam and phishing. Phishing is
to trick computer users into giving their account numbers and passwords by inducing them
into entering seemingly legal homepage and becomes one of the most prevalent methods
to cheat in networks. These malwares usually undermine computer systems by way of leak
invasion, backdoor embedding, hardware infusion or input-path introduction.
 Cyber Attack: A cyberattack is a malicious and deliberate attempt by an individual or
organization to breach the information system of another individual or organization. Usually,
the attacker seeks some type of benefit from disrupting the victim’s network.
8

THANK YOU

You might also like