Module01-Cyber Security
Module01-Cyber Security
Computer and web technology have revolutionized the way we live, work, and
communicate. They are intricately connected and have evolved significantly over the years.
Here's an overview of these technologies:
Computer Technology
Web Technology
Web Development: The World Wide Web (WWW) is at the core of web technology.
Web development involves creating websites and web applications using languages such as
HTML, CSS, JavaScript, and server-side scripting languages like PHP, Python, and Ruby.
Web Browsers: Web browsers like Google Chrome, Mozilla Firefox, and Microsoft Edge
allow users to access and interact with web content. They support HTML rendering,
JavaScript execution, and provide a user-friendly interface.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 1
Module 01: Introduction to Cyber Security.
Web Standards: Organizations like the World Wide Web Consortium (W3C) establish
web standards and protocols to ensure compatibility and consistency across browsers and
devices. These standards promote accessibility and responsive design.
Mobile Technology: Mobile web technology has grown significantly with the
proliferation of smartphones and tablets. Responsive web design and mobile applications
enable a seamless user experience on various devices.
E-commerce: The web has become a major platform for online shopping and transactions.
Secure payment gateways and e-commerce platforms facilitate online business.
Social Media: Web technology has given rise to social media platforms like Facebook,
Twitter, and Instagram, which connect people, facilitate communication, and support
content sharing.
Web Hosting: Web hosting services provide the infrastructure and servers needed to
publish websites on the internet. Various hosting options include shared hosting, VPS,
dedicated servers, and cloud hosting.
Search Engines: Search engines like Google and Bing use complex algorithms to index
and rank web content, making it easier for users to find information online.
Web Security: Web security measures, such as HTTPS, SSL/TLS encryption, and secure
coding practices, protect users' data and privacy. Security breaches and data protection are
growing concerns in web technology.
Web Analytics: Tools like Google Analytics help website owners track visitor behavior,
analyze website performance, and make data-driven decisions.
Both computer and web technology are constantly evolving. Emerging technologies
like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are further
shaping the landscape of computing and the web. As these technologies advance, they
continue to influence nearly every aspect of modern life, from business and communication
to entertainment and education.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 2
Module 01: Introduction to Cyber Security.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 3
Module 01: Introduction to Cyber Security.
Communication and web technology continue to evolve, offering new features and
possibilities for connecting people and organizations worldwide. The integration of artificial
intelligence, improved video streaming, augmented reality, and virtual reality in web-based
communication further expands the opportunities for effective and engaging digital
interactions.
Internet
The internet, often simply referred to as "the net," is a global network of
interconnected computer networks that use standardized communication protocols to link
devices worldwide. It is the largest and most extensive information and communication
infrastructure ever created. Here are some key aspects of the internet:
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 4
Module 01: Introduction to Cyber Security.
The internet has had a profound impact on nearly every aspect of modern life, from
business and education to communication and entertainment. It has facilitated globalization,
democratized information access, and fostered innovation on a massive scale. As it continues
to evolve, the internet is expected to bring about further transformations in how we interact,
work, and live.
Advent of Internet
The advent of the internet represents a pivotal moment in the history of technology
and communication. Here's an overview of the key milestones and developments in the
evolution of the internet:
1960s - The ARPANET: The precursor to the internet was the ARPANET (Advanced
Research Projects Agency Network), a U.S. Department of Defence project created in
1969. ARPANET was designed to facilitate communication among researchers and
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 5
Module 01: Introduction to Cyber Security.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 6
Module 01: Introduction to Cyber Security.
2020s - IoT, 5G, and Emerging Technologies: The 2020s have seen the expansion of the
Internet of Things (IoT), which connects a wide range of devices to the internet. The
rollout of 5G networks promises faster and more reliable connectivity, while emerging
technologies like artificial intelligence (AI), blockchain, and augmented reality (AR) are
being integrated into the internet ecosystem.
The first web page was created in 1990, and the web quickly expanded, becoming the
primary medium for sharing information, conducting e-commerce, socializing, and accessing
online services. It has played a transformative role in how we work, learn, communicate, and
entertain ourselves in the digital age. It's a key component of the internet and is used for
information retrieval, communication, and a wide range of online activities. Here are some
key aspects of the World Wide Web:
Hypertext and Hyperlinks: The web is built on the concept of hypertext, which
allows documents to contain links to other documents. These links are called
hyperlinks, and they enable users to navigate between web pages by simply clicking
on them. Hyperlinks make the web non-linear and highly interactive.
Web Pages: Web pages are individual documents that can contain various types of
content, including text, images, videos, and interactive elements. They are typically
created using HTML (Hypertext Markup Language) and can be displayed in web
browsers.
Web Browsers: Web browsers, like Google Chrome, Mozilla Firefox, Microsoft
Edge, and Safari, are software applications that allow users to access, view, and
interact with web content. They render web pages and provide the interface for
navigating the web.2
Uniform Resource Locators (URLs): URLs are web addresses that are used to
locate and access specific web resources. They consist of a protocol (e.g., "http" or
"https"), domain name (e.g., "www.example.com"), and a specific path to a resource
(e.g., "/page1").
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 7
Module 01: Introduction to Cyber Security.
HTML and Web Standards: The web operates based on standardized protocols and
languages, with HTML as the core markup language for creating web pages. Web
standards ensure consistency and compatibility across different browsers.
HTTP and HTTPS: Hypertext Transfer Protocol (HTTP) is the protocol used for
transmitting web pages, while HTTPS (HTTP Secure) is the secure version of HTTP,
encrypting data exchanged between the user and the web server. HTTPS is essential
for secure web browsing.
Web Servers: Web servers store and deliver web content to users when they request it
through their web browsers. Servers respond to requests, retrieve web pages, and send
them to the user's browser.
Search Engines: Search engines like Google, Bing, and Yahoo index web content and
provide a means for users to search and find specific information on the web.
Web Development: Web development involves creating and maintaining web pages
and websites. Web developers use various technologies, including HTML, CSS
(Cascading Style Sheets), and JavaScript, to design and build web applications.
Web Accessibility: Efforts are made to ensure that web content is accessible to
individuals with disabilities, as per web content accessibility guidelines (WCAG).
This includes providing alternative text for images, semantic HTML, and keyboard
navigation support.
Data Centres: Data centres are physical facilities where servers, storage, and
networking equipment are housed. These facilities play a crucial role in data storage,
processing, and distribution. Data centres must be strategically located, efficiently
designed, and secured to protect sensitive data.
Network Infrastructure: This includes the hardware (routers, switches, fiber-optic
cables, etc.) and software (protocols and routing algorithms) that enable data to flow
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 8
Module 01: Introduction to Cyber Security.
between different devices and data centres. High-speed, reliable networks are
essential for data transfer.
Cloud Computing: Cloud platforms provide scalable and on-demand resources for
data storage and processing. They offer the flexibility needed for managing and
governing data while adhering to various compliance standards.
Security Measures: Security is paramount for data governance. Infrastructure must
include firewalls, encryption, access controls, and intrusion detection systems to
protect data from unauthorized access, breaches, or cyberattacks.
Data Storage: Storage solutions range from traditional on-premises servers to cloud-
based and hybrid storage options. Data storage infrastructure should support data
retention policies, redundancy, and data recovery.
Data Encryption: Encryption technologies like SSL/TLS, IPsec, and end-to-end
encryption protect data during transmission and storage. This is critical for ensuring
data privacy and security.
Data Governance Frameworks: Data governance is the process of managing data
quality, data policies, and data access rights. A framework should be established to
define data ownership, responsibilities, and compliance with regulations like GDPR,
HIPAA, or other industry-specific standards.
Data Transfer Protocols: Protocols like HTTP, FTP, and various application-level
protocols are used for transferring data. Choosing the right protocol depends on the
type of data and the security requirements.
Blockchain and Distributed Ledger Technology: These technologies can play a role
in ensuring data integrity, transparency, and traceability. They are particularly
valuable for applications involving financial transactions and sensitive records.
Compliance and Regulatory Measures: Infrastructure should facilitate compliance
with regional and industry-specific regulations. This might include data residency
requirements, data classification, and audit trails.
Monitoring and Auditing Tools: Systems for monitoring data traffic, logging, and
auditing are vital for ensuring that data transfer and governance are in line with
policies and standards. This includes intrusion detection systems, security information
and event management (SIEM) tools, and data loss prevention (DLP) systems.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 9
Module 01: Introduction to Cyber Security.
User Authentication and Access Control: To enforce data governance, robust user
authentication and access control mechanisms should be in place. This ensures that
only authorized users can access and modify data.
Disaster Recovery and Redundancy: Infrastructure should incorporate backup and
disaster recovery solutions to protect against data loss due to hardware failures,
natural disasters, or cyberattacks.
Scalability and Performance: The infrastructure should be scalable to accommodate
increasing data volumes and ensure that data transfer and governance functions
smoothly as the organization grows.
Data Catalogues and Metadata Management: These tools help organizations keep
track of their data assets, making it easier to classify, search, and manage data for
governance purposes.
Internet society
The Internet Society (ISOC) is a global nonprofit organization founded in 1992 with
the mission to promote the open development, evolution, and use of the internet for the
benefit of all people. ISOC plays a pivotal role in advocating for an open, secure, and
accessible internet and in shaping its future. Here are some key aspects of the Internet
Society:
Advocacy for Open Internet: The Internet Society is a strong advocate for
maintaining the fundamental principles of an open internet. It works to ensure that the
internet remains a global, collaborative platform accessible to all, free from
censorship and discrimination.
Technical Leadership: ISOC has been closely associated with the Internet
Engineering Task Force (IETF) and the Internet Architecture Board (IAB), playing a
crucial role in developing and maintaining the technical standards and protocols that
underpin the internet.
Internet Governance: The organization is actively involved in discussions related to
internet governance, striving to ensure a multi-stakeholder approach that includes
governments, civil society, the private sector, and technical experts.
Access and Connectivity: ISOC promotes efforts to increase internet access and
connectivity, particularly in underserved and remote areas. It supports initiatives to
bridge the digital divide and expand access to those who lack it.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 10
Module 01: Introduction to Cyber Security.
Security and Trust: ISOC emphasizes the importance of online security, privacy, and
trust. It provides resources and support for individuals, organizations, and
policymakers to strengthen the security of internet infrastructure and services.
Community Building: ISOC encourages the development of local chapters and
communities of internet enthusiasts around the world. These chapters play a crucial
role in promoting ISOC's mission on a regional and local level.
Internet Hall of Fame: The Internet Society established the Internet Hall of Fame to
honor individuals who have made significant contributions to the development and
advancement of the internet.
Publications and Research: ISOC produces reports, articles, and research on various
internet-related topics. These resources are made available to the public to further
understanding and knowledge of the internet.
Collaboration and Partnerships: ISOC collaborates with other organizations,
including regional internet registries, universities, governments, and industry
stakeholders, to address various challenges and opportunities related to the internet.
Capacity Building: The Internet Society offers educational programs, workshops,
and online courses to help individuals and organizations build their knowledge and
expertise related to internet technologies and policies.
Support for Internet Standards: ISOC's support for the development and promotion
of open standards ensures that the internet remains interoperable and adaptable to
emerging technologies and use cases.
The Internet Society is committed to fostering an internet that remains open, globally
connected, secure, and accessible. Its work encompasses both technical and policy aspects,
with a focus on ensuring that the internet continues to serve as a force for innovation,
collaboration, and positive change around the world.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 11
Module 01: Introduction to Cyber Security.
OR
The term cyber security refers to techniques and practices designed to protect digital
Data.
The data that is stored, transmitted or used on an information system.
OR
Cyber is related to the technology which contains systems, network and programs or
data.
Whereas security related to the protection which includes systems security, network
security and application and information security.
Listed below are the reasons why cyber security is so important in what’s become a
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 12
Module 01: Introduction to Cyber Security.
Because of the above reasons, cyber security has become an important part of the
business and the focus now is on developing appropriate response plans that minimize the
damage in the event of a cyber attack but, an organization or an individual can develop a
proper response plan only when he has a good grip on cyber security fundamentals.
Confidentiality
Integrity
Availability
Availability is making sure that authorized parties are able to access the information when
needed.
This is the final component of the CIA Triad and refers to the actual availability of your
data. Authentication mechanisms, access channels and systems all have to work properly
for the information they protect and ensure it's available when it is needed.
Standard measures to guarantee availability include:
Backing up data to external drives
Implementing firewalls
Having backup power supplies
Data redundancy
The CIA Triad is all about information. While this is considered the core factor of the
majority of IT security, it promotes a limited view of the security that ignores other important
factors.
For example, even though availability may serve to make sure you don't lose access to
resources needed to provide information when it is needed, thinking about information
security
in itself doesn't guarantee that someone else hasn't used your hardware resources without
authorization.
It's important to understand what the CIA Triad is, how it is used to plan and also to
implement a quality security policy while understanding the various principles behind it. It's
also important to understand the limitations it presents. When you are informed, you can
utilize the CIA Triad for what it has to offer and avoid the consequences that may come along
by not understanding it
Cybersecurity Goals
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 14
Module 01: Introduction to Cyber Security.
Confidentiality: Ensuring that sensitive data remains private and is only accessible to
authorized users.
Integrity: Maintaining the accuracy and reliability of data, ensuring it's not altered by
unauthorized parties.
Availability: Ensuring that systems and data are available and accessible when
needed.
Authentication: Verifying the identity of users and systems.
Authorization: Determining what actions and resources users are allowed to access.
Non-Repudiation: Preventing individuals from denying their actions or transactions.
Cybersecurity Measures
Firewalls: Hardware or software-based systems that monitor and control incoming and
outgoing network traffic to prevent unauthorized access.
Antivirus Software: Programs designed to detect, prevent, and remove malware.
Encryption: The process of encoding data to protect it from unauthorized access,
ensuring that even if data is intercepted, it cannot be read without the decryption key.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Tools
that monitor network traffic for suspicious activity and can either detect or block
potential threats.
Patch Management: Keeping software and systems up to date with the latest security
patches and updates.
Security Awareness Training: Educating individuals and organizations about
cybersecurity best practices and the risks associated with various online activities.
Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA): Adding
an extra layer of security by requiring more than just a password for user authentication.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 15
Module 01: Introduction to Cyber Security.
Cybersecurity best practices are crucial for safeguarding personal and organizational
data from cyber threats. Here are some key practices:
Strong Passwords: Use complex, unique passwords for each account or system.
Consider using a password manager to generate and store passwords securely.
Multi-Factor Authentication (MFA): Enable MFA wherever possible. This adds an
extra layer of security by requiring additional verification beyond passwords.
Regular Updates and Patching: Keep all software, operating systems, and applications
up-to-date with the latest security patches. Regularly install updates to fix vulnerabilities.
Firewalls and Security Software: Use firewalls to control incoming and outgoing
network traffic and install reputable antivirus/anti-malware software to detect and prevent
threats.
Data Encryption: Encrypt sensitive data, both in transit and at rest. Encryption helps
protect data if it falls into unauthorized hands.
Awareness and Training: Educate employees or individuals about cybersecurity risks,
phishing scams, and best practices. Regular training can help prevent human error-based
security breaches.
Backup Your Data: Regularly back up important data to an external, secure location.
This helps in case of data loss due to ransomware attacks or system failures.
Limit Access and Permissions: Implement the principle of least privilege, granting users
access only to the data and systems necessary for their roles.
Secure Wi-Fi Networks: Use strong encryption (WPA3) and change default passwords
on routers. Avoid connecting to public Wi-Fi for sensitive transactions.
Incident Response Plan: Develop and practice an incident response plan to mitigate the
impact of a security breach. This includes steps to identify, contain, eradicate, and recover
from security incidents.
Regular Security Audits: Conduct regular security audits and risk assessments to
identify vulnerabilities and address them promptly.
Vendor Risk Management: Assess and manage the security risks posed by third-party
vendors or partners that have access to your systems or data.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 16
Module 01: Introduction to Cyber Security.
your defense against cyber threats, but it's essential to stay vigilant and proactive in
protecting your digital assets.
Cybersecurity faces a wide range of issues and challenges, many of which continue to
evolve with the changing technology landscape. Addressing these issues is essential to protect
data, systems, and infrastructure from cyber threats. Here are some of the key challenges and
issues in cybersecurity:
Cyber Threats: Cyber threats are constantly evolving and becoming more
sophisticated. This includes malware, ransomware, phishing attacks, and advanced
persistent threats (APTs). The ability of attackers to create new attack vectors and
techniques poses a significant challenge for cybersecurity professionals.
Insider Threats: Insider threats come from within an organization and can be
intentional or unintentional. Malicious employees or contractors can compromise
security, as can employees who inadvertently click on malicious links or share
sensitive information.
Zero-Day Vulnerabilities: Zero-day vulnerabilities are software vulnerabilities that
are not yet known to the vendor, making them challenging to defend against.
Cybercriminals often exploit these vulnerabilities before patches are available.
Supply Chain Vulnerabilities: The interconnected nature of the supply chain means
that cyber vulnerabilities in one company can affect others. This was evident in the
SolarWinds and Colonial Pipeline attacks, where supply chain weaknesses were
exploited.
Internet of Things (IoT): The proliferation of IoT devices, many of which lack
robust security features, poses a significant challenge. These devices can be exploited
as entry points into networks or used in botnet attacks.
Cloud Security: As organizations migrate data and systems to the cloud, securing
these environments becomes increasingly complex. Misconfigured cloud resources
and shared responsibility models can lead to vulnerabilities.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 17
Module 01: Introduction to Cyber Security.
Mobile Device Security: The widespread use of mobile devices for work and
personal tasks increases the attack surface. Mobile malware, unsecured Wi-Fi
networks, and lost or stolen devices are ongoing concerns.
Regulatory Compliance: Many industries and regions have specific regulations
governing data protection and cybersecurity. Staying compliant with these regulations
can be challenging, especially for organizations operating in multiple jurisdictions.
Skill Shortage: There is a shortage of skilled cybersecurity professionals. The rapid
growth in cyber threats and the dynamic nature of the field make it difficult for
organizations to find and retain qualified talent.
User Awareness: Human error is a significant factor in cybersecurity breaches. Users
may click on phishing emails, use weak passwords, or ignore security policies.
Raising awareness and providing training is crucial.
National Security and Geopolitical Threats: Nation-state actors engaging in cyber-
espionage, cyber-warfare, or cybercrime can have far-reaching implications. These
actors often have substantial resources and advanced capabilities.
Emerging Technologies: New technologies like AI, blockchain, and quantum
computing bring both opportunities and risks. AI can be used to enhance security, but
it can also be used by attackers. Quantum computing threatens traditional encryption
methods.
Privacy Concerns: The collection and use of personal data by organizations and the
potential for data breaches raise privacy concerns. Privacy regulations like GDPR in
Europe are changing how data is handled.
Ransomware: Ransomware attacks have become more targeted, with attackers
demanding significant sums of money. Victims, including municipalities and critical
infrastructure providers, face difficult decisions.
Global Threat Landscape: Cyber threats know no borders, and international
cooperation is required to combat them effectively. Geopolitical tensions can affect
cybersecurity efforts and hinder cooperation.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 18
Module 01: Introduction to Cyber Security.
Cyberspace
Cyberspace is a conceptual domain that encompasses the digital environment created
by interconnected computer systems, networks, and the internet. It is a virtual realm where
information is stored, shared, and processed, and where digital interactions, communication,
and activities take place. Here are some key aspects of cyberspace:
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 19
Module 01: Introduction to Cyber Security.
Digital Content: The digital content in cyberspace ranges from text, images, and
videos to software, music, and games. It is available for consumption and interaction
through websites, apps, and streaming services.
Virtual Reality and Augmented Reality: Emerging technologies like virtual reality
(VR) and augmented reality (AR) are expanding the possibilities of cyberspace by
creating immersive digital experiences and overlays on the physical world.
Privacy and Security Concerns: The open and interconnected nature of cyberspace
raises issues related to online privacy, data security, and the protection of personal
information. These concerns have led to the development of various regulations and
privacy practices.
Cyber Warfare and Espionage: Cyberspace has become an arena for nation-states
and threat actors to engage in cyber warfare, espionage, and information operations.
These activities have far-reaching implications for national security.
Cyberspace has transformed how people interact, work, learn, and entertain
themselves. It is a dynamic environment that continues to evolve, driven by technological
advancements and societal changes. As it evolves, the challenges of maintaining security,
privacy, and ethical use in cyberspace remain central concerns for governments,
organizations, and individuals.
Architecture of Cyberspace
The "architecture" of cyberspace, in the context of the internet and digital networks,
refers to the underlying structure, protocols, and components that make up the virtual
environment where digital data and communication take place. It encompasses a wide range
of technologies, standards, and systems that enable the functioning of the internet and digital
networks. Here are some key elements of the architecture of cyberspace:
1. Network Infrastructure
Internet Backbone: The internet backbone consists of high-capacity, long-distance
communication links that connect major data centres and network hubs. These links
form the core of the global internet infrastructure.
Network Protocols: The internet relies on a set of communication protocols,
primarily the Internet Protocol (IP) suite. These protocols govern data packet routing,
addressing, and data transfer.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 20
Module 01: Introduction to Cyber Security.
Internet Service Providers (ISPs): ISPs are organizations that provide access to the
internet for individuals and businesses. They connect end-users to the global internet
by providing data transmission services.
Domain Name System (DNS): The DNS is a distributed system that translates
human-readable domain names (e.g., www.example.com) into IP addresses that
computers use to locate web servers and other network resources.
Web Servers and Clients: Web servers host websites, applications, and online
services. Web clients, typically web browsers, are used by individuals to request and
display web content.
Data Centres: Data centres are facilities that house servers and storage systems,
providing computing resources and hosting data and applications. Cloud providers
operate extensive data centre networks.
Content Delivery Networks (CDNs): CDNs improve web performance by caching
and distributing web content to edge servers located closer to end-users. This reduces
latency and enhances load times.
Internet Exchange Points (IXPs): IXPs are physical locations where different ISPs
connect their networks to exchange traffic. They facilitate efficient routing and reduce
data transfer costs.
2. Routing and Switching Infrastructure
Routers and switches direct data traffic within networks. They make routing decisions to
determine the most efficient path for data packets to reach their destination.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 21
Module 01: Introduction to Cyber Security.
Peering and Transit Agreements: ISPs enter into peering and transit agreements to
exchange traffic and ensure connectivity. These agreements help route data between
different networks.
Wireless and Mobile Technologies: Wi-Fi, 4G, 5G, and other wireless technologies
provide mobile and remote access to the internet, expanding connectivity beyond
wired networks.
Network Management and Monitoring Tools: Tools for network administrators to
manage and monitor network performance, detect issues, and ensure network
availability.
IPv4 and IPv6: Internet Protocol versions 4 (IPv4) and 6 (IPv6) govern IP
addressing. IPv6 was introduced to address the depletion of available IPv4 addresses.
Edge Computing and IoT Devices: Edge computing involves processing data closer
to the source of data generation. IoT (Internet of Things) devices connect to the
internet and generate data at the edge of networks.
Blockchain Technology: Blockchain technology is used to create decentralized and
secure distributed ledgers, which have applications in areas like cryptocurrency and
supply chain management.
Regulation of Cyberspace
The regulation of cyberspace refers to the legal and policy framework that governs
activities in the digital realm, including the internet and other computer networks. Regulation
is necessary to ensure that cyberspace remains secure, protects the rights of individuals and
organizations, and operates in a manner consistent with the law. In India, several regulations
and laws govern cyberspace, aiming to address various aspects of cybersecurity, data
protection, digital rights, and online conduct. Here are some key regulations related to
cyberspace in India:
Information Technology Act, 2000 (IT Act): The IT Act is the primary legislation
governing cyber activities and electronic commerce in India. It defines cybercrimes, lays
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 22
Module 01: Introduction to Cyber Security.
down penalties for offenses like hacking, data theft, cyber fraud, and sets legal provisions
for electronic signatures and records.
The Information Technology (Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules, 2011: These rules under the IT Act
provide guidelines and regulations for the collection, handling, and protection of sensitive
personal data or information by Indian companies.
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and
Services) Act, 2016: This Act established the legal framework for the Aadhaar system,
which assigns a unique identification number to Indian residents. It addresses the
collection and storage of biometric and demographic data and aims to ensure data
protection and privacy.
The Reserve Bank of India (RBI) Guidelines: The RBI issues various guidelines and
regulations related to cybersecurity for banks and financial institutions. These guidelines
focus on securing banking operations and customer data against cyber threats.
The Personal Data Protection Bill, 2019 (PDP Bill): Though not enacted as of my last
update in January 2022, the PDP Bill aims to regulate the processing and transfer of
personal data in India. It focuses on protecting the privacy and rights of individuals
regarding their personal data.
The Cyber Security Strategy of India: The Indian government has developed a
comprehensive cybersecurity strategy to enhance the country's cybersecurity posture,
combat cyber threats, and strengthen cybersecurity measures across sectors.
Computer Emergency Response Team-India (CERT-In): CERT-In is the national
nodal agency in India that handles cybersecurity incidents, alerts, and provides guidelines
to mitigate cyber threats.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 23
Module 01: Introduction to Cyber Security.
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 24