0% found this document useful (0 votes)
32 views18 pages

CS module1QB

5 sem bba

Uploaded by

hemanthreddy4112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views18 pages

CS module1QB

5 sem bba

Uploaded by

hemanthreddy4112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

V semester BBA

CYBER SECURITY
-------------------------------------------------------------------------------------------------------------
MODULE-I
SECTION A
a) Define Web Technology.
o Web Technology refers to the various tools and techniques that are utilized in the process
of communication between different types of devices over the Internet.

b) Define Cyber Security.


o Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.

c) What is Cyberspace?
o Cyberspace is defined as a virtual and dynamic environment comprised of electronics and
communication devices over various networks to store and utilize electronic data.

d) Define Internet and Intranet.


o The Internet is a global network of computers that allows users to communicate with each
other and access information from around the world.
o An intranet can be defined as a private network used by an organization. Its primary
purpose is to help employees securely communicate with each other, to store information,
and to help collaborate.

e) What is WWW?
o World Wide Web, which is also known as a Web, is a collection of websites or web pages
stored in web servers and connected to local computers through the internet.

f) State the meaning of Phishing.


o Phishing is a type of social engineering and cyber security attack where the attacker
impersonates someone else via email or other electronic communication methods,
including social networks and Short Message Service (SMS) text messages, to reveal
sensitive information.

g) What is an ARPANET?
o The U.S. Advanced Research Projects Agency Network (ARPANET) was the first public
packet-switched computer network.
SECTION B & SECTION C
1) Explain the various features of Internet.
 The Internet is a global network of computers that is accessed by the World Wide Web.
 The internet is defined as a global network of linked computers, servers, phones, and smart
appliances that communicate with each other using the transmission control protocol (TCP)
standard to enable the fast exchange of information and files, along with other types of
services.
FEATURES OF THE INTERNET
ACCESSIBILITY
FLEXIBILITY
EASY TO USE
SECURITY
LOW COST
SHARE ANYTHING
CONNECTIVITY
THINGS ARE ONLINE
 Accessibility: Internet accessibility refers to the ability of individuals to access and use the
Internet. This includes the ability to use the Internet for communication, education,
employment, and other activities. There are a variety of factors that can impact an
individual's ability to access and use the Internet, including economic, social, and
technological factors. In simple words, in this present time, anyone accesses the internet
easily.
 Flexibility: Flexibility on the internet is a big advantage. It makes it possible to work from
home or anywhere. No need to commute anywhere. Flexibility brings work-life balance.
The Internet is a technology, in which the help of you can work from anywhere at any time.
You can do a lot with the Internet that you do anywhere else, now you can do it from your
home too. You can be your own boss. You can run your own business.
 Easy to Use: The Internet is much more accessible and easier to use than other mediums –
it’s fast, easy, accessible, convenient, and cheap! The information you get is much more
comprehensive and up-to-date than what you get through newspapers, the radio and
television.
 Security: Security is the paramount issue of the Internet. Without security, no one will trust
a particular Internet-based service. No one will use Internet banking; no one will trust any
email that claims to be from your bank/credit card provider. So, it's as important to make
the Internet secure as it is to make it usable.
 Low Cost: Cost is an important factor when thinking about using the Internet. The Internet
is an open-source technology, which means its base is open to public view and anyone can
take advantage of it to develop their own software. Due to the development of open-source
technology, the Internet has been able to have huge savings in comparison to other forms
of technology.
 Share Anything: The Internet has so many features that it is impossible to list them all. You
can share anything, anywhere. What kind of subject are you specifically interested in? You
can go to read the news, talk to your friends, and do many other things. The Internet is a
network of computers that communicate with each other.
 Connectivity: Connectivity is one of the main features of the Internet, allowing people to
connect with each other in many ways. It provides an interface for electronic
communication through various networks, including the net and mobile
phone networks. Two-way connectivity, bidirectional communication, is the most common
form of connectivity, especially for Internet services.
 Things are Online: The Internet is a constantly growing network connecting computers
throughout the world. The Internet is a great medium to shop for anything. With the help of
internet you can easily do many things such as - sending and receiving emails, sharing
photos and videos, watching videos, meeting people, keep in touch with your friends &
family members. Today many digital and physical items and services are available online,
and many items or services can get at very cheapest prices through the Internet.

2) Explain the impact of internet on society.


 The Internet is a global network of computers that is accessed by the World Wide Web.
 The internet is defined as a global network of linked computers, servers, phones, and smart
appliances that communicate with each other using the transmission control protocol (TCP)
standard to enable the fast exchange of information and files, along with other types of
services.
IMPACT OF INTERNET ON SOCIETY
 Improved Communication: Communication is the most important part of society, we build
or transfer our thoughts with each other with the help of communication. Earlier people
used pigeons or birds to transfer their messages to their loved ones. After that technology
slowly grows and the medium of transferring information is changed to mobile phones,
email, etc. Nowadays, we send messages to loved ones or known people via email, social
media platforms, etc. It is the fastest, efficient, and effective medium. People can talk or
share information with their loved ones easily even if they are very far away from them.
 Improved Education and learning process: Technology enhances the education and
learning process. Nowadays, people can easily enhance their knowledge using the internet.
Most of the data is present on the internet is free of cost, and you can access this data
anytime and anywhere.
 Mechanized Agriculture: Technology changes the working mechanism of farmers. Lots of
machines and technical instruments were introduced in the agricultural area which makes
farming very easy, effective, automated, etc.
 Easy to access information: We can easily access information via the internet anytime and
anywhere. Most of the information is present on the internet are free of cost, so you can
use them to enhance your knowledge, skills, etc.
 Employment: The Internet has changed the way we work, with many people now
freelancing or working remotely. The rise of the gig economy has given people greater
flexibility and autonomy in their careers, allowing them to set their schedules and work
from anywhere with an Internet connection. And since covid, many long-standing office
jobs are now flexible with work-from-home options.
 Financial Services: Gone are the days of standing in long lines at the bank to manage our
finances. The Internet has enabled us to easily open accounts, make deposits and
withdrawals, and access various banking options, such as crypto currency and e-wallets,
through a computer or even a cell phone app.
 Entertainment: The Internet has also transformed the entertainment industry. We can now
access a wide range of movies, music, and games online and even play online casino games
from the comfort of our own homes. The Internet has also made it possible for people to
compete against others from around the world in online gaming tournaments.
 Shopping: Before the Internet, shopping meant physically going to stores and browsing
through products in person or calling a customer service call center using codes from a
catalog. The Internet has made it possible for us to shop from the comfort of our own
homes, with a vast array of products and services available at our fingertips. We can now
easily compare prices, read reviews, and purchase online, with many retailers offering home
delivery or pickup options.

3) Explain the Advantages and Disadvantages of the Internet


 The Internet is a global network of computers that is accessed by the World Wide Web.
ADVANTAGES OF THE INTERNET
 Provides an Easier Means of Communication: The Internet revolutionized communication
by providing many tools for individuals and businesses to connect globally. It enables real-
time communication through email, instant messaging, and video calls. Social media
platforms like Facebook, Instagram, and Twitter have also transformed how we interact and
share our lives with friends and family. Example: During the Arab Spring uprisings in 2010-
2011, protesters used Internet platforms like Twitter and Facebook to share information,
coordinate actions, and raise global awareness of their movements.
 Gives Access to Unlimited Information: The Internet is a treasure of information with
search engines like Google and AI chatbots like ChatGPT, making it easy to find answers to
any question. This accessibility to knowledge has transformed the way we learn and
conduct research. The Internet allows us to access the latest news and updates in a matter
of seconds. Example: The COVID-19 pandemic highlighted the value of online information
access. Health organizations like the World Health Organization (WHO) & Centers for
Disease Control and Prevention (CDC) and governments use the Internet to disseminate
critical updates, guidelines, and research findings to the public.
 Allows Selling Products and Services Online: The Internet has transformed how we shop
and access various products and services. E-commerce platforms like Amazon, eBay, and
Shopify provide a broad range of products that can be purchased online and delivered to
your doorstep. Services, such as ride-sharing (e.g., Uber) and food delivery (e.g., Uber Eats),
have become integral parts of our lives, offering convenience and efficiency.
Example: Amazon, the world’s largest online retailer, has revolutionized how people shop.
Amazon Prime, for instance, provides fast and convenient delivery services for millions of
products.
 Offers Abundance of Entertainment Options: The Internet offers many entertainment
options, including streaming services (Netflix, YouTube, and Spotify), providing access to
movies, TV shows, music, etc. Online gaming platforms, such as Steam and Xbox Live,
enable multiplayer gaming and social interaction. These platforms offer a wide range of
entertainment options tailored to individual preferences. Example: Streaming platforms like
Netflix have disrupted the traditional television industry. The release of popular series like
“Stranger Things” and “The Crown” has captivated global audiences, providing on-demand,
high-quality entertainment accessible through the Internet.
 Helps Boost Sales Through Online Marketing: Businesses use the Internet for marketing
and advertising purposes. Digital marketing includes techniques like social media marketing,
SEO, and email marketing to reach a broader audience and promote products and services.
Example: The “Ice Bucket Challenge” in 2014 became a viral sensation on social media and
demonstrated the power of online marketing for a cause. The campaign, aimed at raising
awareness and funds for ALS (Amyotrophic Lateral Sclerosis) research, engaged millions of
participants who shared their challenge videos, leading to increased donations and research
funding.
 Allows use of Banking Services Online: Internet banking, or online banking, allows
individuals to manage their financial accounts from the comfort of their homes. This
includes checking balances, transferring funds, paying bills, and even applying for loans.
Most banks offer secure online banking services with mobile apps for easy access.
Example: Online banking services offered by institutions like JPMorgan Chase, Bank of
America, State Bank of India, ICICI Bank, and others allow customers to check account
balances, transfer funds, and pay bills with ease.
 Makes Plenty of Education Resources Accessible: Online education platforms like EDUCBA,
Coursera, edX, and Khan Academy offer courses on various subjects. Universities and
schools also use online learning management systems to facilitate distance education.
DISADVANTAGES OF THE INTERNET
 Contains Tons of Misleading Information: The Internet is a vast source of information, but
not all of it is accurate or trustworthy. Misleading information, fake news, and online
hoaxes are prevalent, making it challenging for users to distinguish fact from fiction.
Misinformation can influence public opinion, and it can have serious consequences, such as
the spread of false health information during a pandemic. Example: During the COVID-19
pandemic, misinformation and fake cures circulated widely on social media platforms.
Misinformation made it challenging for the public to access accurate, science-based
information.
 Negatively Affects Your Physical Health: The Internet can lead to physical health issues,
including a sedentary lifestyle, eye strain, poor posture, sleep disturbances, digital
addiction, stress from online interactions, and concerns about electromagnetic radiation.
Example: The COVID-19 pandemic forced many individuals to rely on digital devices for
work, education, and social interactions. Thus, the sudden increase in screen time had an
impact on physical and mental health, like eye strain, sleep disturbances, etc.
 Easy Access to Confidential Data Raises Privacy Issues: With the vast amount of personal
and sensitive information being shared and stored online, it is easy for unauthorized users
to get individual and business confidential data. This can lead to privacy violations, identity
theft, and the misuse of sensitive data. Example: In 2013, Edward Snowden, a former
National Security Agency (NSA) contractor, exposed extensive government surveillance
programs that collected data on individuals’ digital activities. This revelation raised concerns
about the extent of personal data that governments and corporations can access,
highlighting the importance of safeguarding one’s digital footprint.
 Leads to Cyber Crimes: Cybercrimes are a range of malicious online activities, including
cyber bullying, unauthorized hacking, distribution of malware, and various scams. These
actions often exploit digital technologies and the Internet to target individuals,
organizations, or systems for personal gain, harassment, or fraud, posing significant threats
to online security and privacy. Example: In 2020, the tragic case of Caroline Flack, a British
television presenter, highlighted the consequences of cyber bullying. She faced relentless
online harassment and abuse, which contributed to her mental health struggles. Despite her
public profile, the impact of cyber bullying on her well-being was devastating, ultimately
leading to her untimely demise.
 Increases the Risk of Identity Theft: Identity theft occurs when an individual’s personal
information, such as their Social Security number, credit card details, or bank account
information, is stolen and used for fraudulent purposes. Cybercriminals can use security
issues in our systems to steal this information, leading to financial loss and damage to one’s
reputation. Example: The Equifax data breach in 2017 is one of the most significant identity
theft cases in recent history. Hackers gained access to sensitive personal and financial
information of nearly 143 million Americans. This breach resulted in financial fraud and
identity theft for many victims.
 Can Cause Addiction & Social Alienation: The easy access to a wide array of online content,
including social media apps, can lead to excessive screen time. This can result in individuals
becoming socially isolated, neglecting real-world relationships, and prioritizing online
interactions over in-person connections. This can have negative impacts on mental health
and overall well-being. Example: The case of a South Korean couple in 2010 drew
widespread attention when they were arrested for allowing their 3-month-old daughter to
starve to death while they were engrossed in playing an online game. This tragic incident
illustrated the extreme consequences of online gaming addiction. The couple’s obsession
with the game led to severe neglect of their real-life responsibilities, ultimately resulting in a
tragic loss.
 Can Potentially Cause Depression: Excessive use of the Internet and social media has been
linked to higher rates of depression among teenagers. The constant comparison with peers,
cyber-bullying, and exposure to negative content can contribute to feelings of inadequacy
and low self-esteem. Example: Numerous studies have shown a link between heavy social
media use and increased rates of depression among teenagers. The “Facebook depression”
phenomenon, where young people experience depression related to comparing themselves
to their peers on social media, has become a recognized issue. The 2017 Netflix
documentary “The Social Dilemma” explores this problem in depth.
 Consists of Inappropriate Content: The ease of access to explicit or pornographic content
on the Internet is a concern for both children and adults. While adults can make informed
choices about their online content consumption, minors may accidentally or intentionally
access such material, which can have psychological and emotional consequences.
Example: In 2017, the “Marines United” scandal exposed the distribution of explicit photos
of service members without their consent in a private Facebook group. This incident revealed
the harmful use of the Internet to share non-consensual explicit content among military
personnel, sparking investigations and discussions about online privacy and ethics.

4) Explain the various communication technologies.


 Communication technology refers to all the tools used to send, receive, and process
information.
 Communication technology is any digital tool you can use to send and receive information.
This technology can include software, computer programs, devices and messaging systems.
VARIOUS COMMUNICATION TECHNOLOGIES
 Telephones: The most common type of communication technology today is phones —
particularly smartphones. They’re a tried-and-true communication tool that allows for long
distance connection. Though telephones have changed a lot since their conception, the
purpose behind them remains the same.
 Instant messaging: For the past two decades, instant messaging has been a huge area of
communication technology. For example, AOL instant messenger was a very popular
method of communication in the late ’90s and 2000s. Microsoft’s MSN Messenger was
another common tool during this time. Today, instant messaging is available in many
channels, such as X (formerly Twitter), Facebook Messenger, Google Chat, Instagram, and
other platforms.
 Email: In a similar vein, email is another example of communication technology introduced
decades ago that’s still going strong today. For example, Hotmail was an email platform
from Microsoft that was rebranded over time to Outlook. Still, it offers the same general
services. Other common email platforms include: Gmail, Yahoo Mail, Apple Mail, and
Windows Mail
 Social media: It’s hard to imagine a world without social media, but before social media,
connecting with others outside of a person’s usual circle was pretty difficult. Social media
platforms — namely Facebook (Meta), X (formerly Twitter), Instagram, and Snap chat — are
a great example of communication technology. It helps people communicate from all over
the world, instantaneously. For example, people can share photos, videos, and other
information to better connect with others.
 Video conferencing: Video conferencing is an extremely powerful communication
technology tool that gives others the chance to talk with each other face-to-face, no matter
where in the world they are. During the COVID-19 pandemic, the use of video conferencing
apps like Zoom and Google Meet exploded in popularity. Because people could no longer
have as many face-to-face meetings, Zoom meetings became the new normal, leading to
unexpected side effects, such as Zoom fatigue.
 Satellite: A satellite is an item that has been purposely sent into orbit in the context of
spaceflight. To distinguish them from natural satellites such as Earth's Moon, these objects
are referred to as artificial satellites. Although radio waves successfully transmit signals,
long-distance communications are hindered by the ionosphere, a tiny layer of energetic
plasma that exists above the breathing atmosphere.
 The internet: The concept of the internet, the World Wide Web revolutionized
communication. Since its conception, people have been able to talk to anyone across the
globe online. Finding information became even more accessible and more efficient,
especially with the introduction of Google’s search engine.
 Podcasts: Podcasts are audio-based forms of communication. Creators can record
themselves discussing a topic or telling a story, then upload and store the audio online.
Audiences can download the podcast to listen to on their devices. Successful podcasts are
often those that focus on a specific topic that has a dedicated audience, such as crime or
politics. One feature that makes podcasts so popular is listeners can download and listen to
them whenever they want. You can use a podcast to discuss a topic you're an expert on or
to promote your brand.
 Television: Television is another way to reach extensive audiences, but it brought a new
perk to the table: visual communication. Some information is hard to describe using just
words. Television provides audiences with the best of both worlds: information and visuals
to accompany it. This advantage caused the television to replace the radio as the leading
tool for mass communication. Today, there are thousands of television channels that
communicate information on almost any topic: history, sports, news, science, fiction, and so
on. Whether it is for entertainment or cold hard facts, people are constantly turning to
television for information.
 Radio: About twenty years after the telephone, communicating using the radio came into
play. Another innovation in the realm of verbal communication, radio is used to reach
sizable audiences, as opposed to just one person on the other end of a phone. The radio’s
ability to reach a large audience at a low cost continues to motivate a lot of communicators
to take full advantage of the tool. Information providers, such as advertisers and
newscasters, spend substantial amounts of time communicating with their massive
audiences using radio technology.

5) Explain the Various technologies are evolving in a cyberspace.


o Cyberspace is defined as a virtual and dynamic environment comprised of electronics and
communication devices over various networks to store and utilize electronic data.
EVOLVING TECHNOLOGIES IN CYBER SPACE
 Artificial Intelligence (AI): The concept of AI is to imitate the problem-solving and decision-
making abilities of the human brain. It involves creating intelligent computers using
advanced programs. The AI works on two basic ideas: thinking rationally and acting
rationally. The former deals with thought processes and reasoning, while the latter deals
with behavior. For example, if we provide a thousand photos of trees to the computer, it
scans and stores the data, which can be used to identify the trees.
 Machine Learning: It is one of the sub-fields of Artificial Intelligence that works on the
concept of self-learning. Instead of programming the computer to do its task, the computer
is allowed to learn from the available data in machine learning. This is also known as the
bottom-up approach. Machine learning involves programming computers to access the data
and use it for self-learning.
 Internet of Things: As the name suggests, the Internet of Things refers to a fabricated
network of physical devices worldwide connected through the internet. Any device
implanted with appropriate sensors, software, and technologies can relate to other devices
over the internet to send and receive data without human intervention. The use of IoT is
endless, from household devices to industrial machines. It means that any device connected
over the internet becomes a part of IoT. Once the devices are connected to an IoT network,
they can be operated from any part of the world without physical contact. It uses sensors,
Internet, Cloud platforms, Machine Learning, and Artificial Intelligence (AI). The size of the
IoT network is getting bigger each day, like a giant robot.
 Quantum Computing: Quantum computing works based on the concept of quantum
physics. It uses quantum bits, also known as qubits, as a basic unit of information. Quantum
computers are better at performing complex tasks at high speed than any supercomputer
can do. The properties of quantum physics, such as superposition and entanglement, are
used in quantum computing.
 Block Chain Technology: The block chain is a decentralized database that differs from a
regular database where the data is stored using a hash function. It stores data in the form of
blocks, and the blocks are connected to form a data chain. When the data is stored in a
block chain, it becomes nearly impossible to tamper, hack or trick the system. Even though
various kinds of information can be stored in block chain, it is mainly used as a transaction
ledger. It is an emerging technology in cyberspace, as its full potential is not realized.
Possible applications of block chain technology will be fund transfers, sharing of medical
data, personal identity security, voting mechanism, etc. It also forms the base for bitcoin,
which could be the future of digital currency.
 Encryption Technology: Encryption technology is gaining more importance in cyberspace. It
is a process of converting the normal text into non-readable cipher text. This prevents
unauthorized persons from interpreting or tampering with the data. It is based on Public
Key Infrastructure (PKI), where the encryption and decryption of data are done by Public-
Private key distribution. There are numerous methods in data encryption that are Advanced
Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), Quantum Key Distribution (QKD),
Triple DES (Data Encryption Standard, etc.
6) Explain about Cyberspace regulations.
 Cyberspace regulations refer to a set of rules, policies, and laws that govern activities
conducted in the digital realm, commonly known as cyberspace.
 Cyberspace regulations are designed to ensure the proper use, security, and integrity of
information and communication technologies.
CYBERSPACE REGULATIONS
 Data Privacy: Regulations often dictate how personal and sensitive information should be
handled, stored, and processed online. These measures are essential to protect individuals'
privacy in the digital age.
 Cyber security: Regulations aim to establish standards and best practices for securing digital
systems and networks. This includes measures to prevent unauthorized access, data
breaches, and other cyber threats.
 Digital Rights: These regulations focus on protecting the rights of individuals in the online
world. This may include freedom of expression, access to information, and the right to a
secure online environment.
 E-Commerce Regulations: Rules governing online business transactions and electronic
commerce, covering issues such as consumer protection, electronic contracts, and online
dispute resolution.
 Intellectual Property: Regulations address the protection of intellectual property rights in
cyberspace, including copyright, trademarks, and patents. This helps prevent online piracy
and counterfeiting.
 Cybercrime Laws: Regulations define and penalize various forms of cybercrime, including
hacking, identity theft, online fraud, and other illicit activities carried out using digital
technologies.
 Content Regulation: Some jurisdictions have regulations governing the type of content that
can be published online. This may include restrictions on hate speech, pornography, and
other harmful materials.
 International Cooperation: Given the global nature of the internet, some regulations focus
on fostering international cooperation to address cyber threats and ensure a consistent
approach to cyber security and digital governance.
 Compliance and Enforcement: Regulations often outline compliance requirements for
individuals, businesses, and organizations operating in cyberspace. Enforcement
mechanisms and penalties for non-compliance may also be defined.

7) Explain the History and evolution of internet and its impact on cyber space.
 Internet, also known as the World Wide Web (www), is a global system of interconnected
computer networks that use a protocol called the Internet Protocol Suite (TCP/IP) to link to
billions of devices all around the world.
 1958 – Founding of the ARPA: In this year, the Advanced Research Projects Agency
Network was founded. This organization was made up of some 200 scientists and its aim
was to create direct communications between computers.
 1967 – ARPANET is born: This year saw the first connection between computers at Stanford
and UCLA. ARPANET was a computer network that brought together the best ideas from
teams at the Massachusetts Institute of Technology (MIT), the National Physics Laboratory
(NPL) and the Rand Corporation (RC).
 1980 – HTML language, URL and HTTP: Tim Berners-Lee joined the European Organization
for Nuclear Research (CERN) that year as a software engineer. In 1989 he presented a
solution to the problems of data loss thanks to a distributed hypertext system. By 1990,
Berners-Lee had developed three technologies: HTML, URLs and the hypertext
transfer protocol HTTP.
 1982 – First virus: Although there were earlier virus cases, the virus created by Rich
Skrenta is considered the first. The 15-year-old student programmed the so-called Elk
Cloner for the Apple II, the first computer virus to have a real spread. Today, Rich is a
Silicon Valley entrepreneur who created the web search engine Blekko.
 1994 – The first search engine and the first online shops: The first full-text search engine
was WebCrawler. Unlike its predecessors, it allowed users to perform a keyword search on
any website. In addition, Yahoo!, Excite, Infoseek, Inktomi, Northern Light and Altavista
were also launched that year. Although the first online sales are said to have taken place on
the Net Market service, in reality it was not until 1994 that the first online shops,
including Amazon and eBay, were launched.
 1996 – Google: Larry Page and Sergey Brin launched today’s quintessential search
engine: Google. The initial project was called BackRub, as that was the name of the
technology they used. Google based the operation of its search engine on the relevance of
the contents of each web page for the users themselves. In other words, it prioritised those
results that users considered most relevant to a specific topic. To do so, it patented its
famous PageRank, a series of algorithms that assess the relevance of a website by assigning
it a score from 0 to 10.
 2004 – Social networks: The 21st century began with the creation
of Wikipedia, Safari, MySpace, LinkedIn, Skype and WordPress. However, it was not until
2004 that Facebook, Vimeo, Flickr and Gmail appeared.
 2005 – YouTube
 2006 – Twitter
 2008 – Google Chrome
 2010 – Instagram y Pinterest
 2011 – Snapchat
 2016 – TikTok
 Present: In Spain alone, there are currently 40.7 million social network users, equivalent
to 87.1% of the Spanish population. In addition, 44 million use the Internet daily for an
average of 6 hours. The Internet is growing by leaps and bounds. We don’t know what
technologies the near future will bring, or what applications of the Internet of Things will
surprise us. Will the metaverse and virtual worlds be here to stay or is it just another
passing fad?

8) Discuss Architecture of cyber space.


o It's also called "cyber security architecture," a framework for describing how a computer
network's standard operating procedures and security protocols should work together.
o An Information system is a combination of hardware and software and telecommunication
networks that people build to collect create and distribute useful data, typically in an
organization.
ARCHITECTURE OF CYBER SPACE.
o The people: They are your users or employees within different functions tasked with certain
roles and responsibilities. Processes and tools don’t work by themselves, so it is fair to say
that the people component is the most important aspect of the golden triangle. Equipped
with the right training and technologies, individual users can be your strongest resource
against breaches. At the same time, poor security practices and lack of security awareness is
a recipe for potential disasters.
o The processes and policies: The process component connects people and tools by defining
the “how” question. It is a series of steps used to meet a business goal.
o A comprehensive process should define how each role fits within a particular workflow,
detail the end-to-end steps for an activity, offer relevant training materials, have a review
system, and a success evaluation metric system. Security policies should be transparent,
easy to understand, and answer why it is adopted. Update the policies as often as necessary
to reflect every minor change.
o The tools: To execute the processes efficiently, people need tools and technology.
Technology as a resource has become a focal point for industries to drive operational
efficiency. But choosing the right security tools is equally important. If the tool does not fit
your unique use case, it can become a headache rather than an enabler.
o Network: With the rise in adoption of the cloud, network is perhaps the most critical
component of cyber-security architecture. It consists of: Network nodes like routers,
repeaters, bridges, switches, modems, print servers, Network Interface Cards (NICs), and
more Security protocols like firewalls, EDR (endpoint detection and response) systems, IRS
(incident response systems), antivirus solutions, threats detection solutions, and more
Communication protocols like HTTP (Hypertext Transfer Protocol, HTTPS (Hypertext
Transfer Protocol Secure), FTP (File Transfer Protocol), SMTP (Simple Mail Transfer
Protocol), IMAP (Internet Message Access Protocol, DHCP (Dynamic Host Configuration
Protocol), and DNS (Domain Name System) Network topologies like bus, star, ring, mesh,
tree, hybrid and more
o Security frameworks: Although not always necessary, this component can be compulsory
depending on the type of data you process. Security frameworks like HIPAA, PCI DSS, ISO
27001, GDPR, NIST, and more help you implement security best practices and provide
guidelines to manage your posture.
o Encryption Keys: There are many types of cyber security equipment, including intrusion
detection systems, firewalls, encryption and decryption devices, and more. Antivirus,
spyware, and antimalware software are all included in this package. Network protocols such
as IMAP and TCP/IP are protected by encryption and other techniques like HTTPS and FTTP.
End-to-end encryption, block chain, and zero-privacy knowledge are some of the best
methods for securing data.
9) Describe the Issues and challenges of cyber security
o Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
ISSUES AND CHALLENGES OF CYBER SECURITY
5G NETWORKS
INCREASING RATE OF MOBILE MALWARE
ARTIFICIAL INTELLIGENCE
IOT DEVICES
RANSOMWARE ATTACKS
OVER PHISHING & SPEAR-PHISHING ATTACKS
HACKTIVISM
DRONEJACKING
SOCIAL ENGINEERING
OFFICE PEOPLE HAVING ACCESS TO DATA OF THEIR ORGANIZATIONS
 Third Parties Can Unlawfully Misuse the Potential of 5G Network: The advent of 5G
networks has sparked curiosity among the youth, offering the promise of more efficient use
of their beloved gadgets. However, it also brings forth a challenge: the risk of emotional or
physical attacks on this tech-savvy generation. Cyber assailants may unlawfully penetrate
the 5G wireless networks, exploiting the data collected or stored by smart and fast gadgets.
These attackers, often third parties, capitalize on the complex architectures of 5G networks
to carry out their malicious activities, leveraging revolutionary marketing tactics.
 An Increasing Rate of Mobile Malware: Mobile malware is harmful software that
intentionally targets the operating systems of mobile devices, disrupting their performance.
The main reason for its occurrence is the insecure usage of URLs over Wi-Fi or other
internet networks. According to the 2024 Mobile Security Report, 97% of organizations face
threats related to mobile malware from various vendors claiming to offer advanced security
for cellular networks. Ignoring such vendors is not an option as they may introduce Trojan
activities, cyber risks, and vulnerabilities.
 AI is Somewhere Controlling Cyber security Systems: Nowadays, healthcare industries and
supply chain departments are adopting tools that support Artificial Intelligence. Also, those
tools have some glimpses of Machine Learning and NLP with which they are helpful in
controlling the datasets primarily involved with patients’ info or orders in which
retailers/distributors are interested.
 Growing Popularity of IoT Devices: The usage of Internet-of-Things devices is trending
nowadays because of their robust reaction-time and the lesser cost they invite in processing
the merits of the cloud technology. Furthermore, the solutions those devices push through
their communication channels are incredible and considered by organizations comprising a
varying number of workforces. However, with such growing popularity, cybercrimes are
increasing continuously.
 Ransomware Attacks are targeting the Critical Business Aspects: Ransomware attacks pose
unpredictable threats to businesses of all sizes, impacting both small and medium
enterprises and larger organizations alike, regardless of their familiarity with data
security and compliance standards. During these attacks, cybercriminals deploy malware or
viruses targeting mobile phones and cellular networks, infecting connected devices like
smartphones and laptops. This breach allows assailants to access personal information,
leaving victims vulnerable to extortion demands.
 No Control over Phishing and Spear-Phishing Attacks: Spear-phishing attacks will easily be
understood once we understand what phishing attacks are basically? So, phishing is
somewhere related to social media and the cybercriminals prefer those phishing attacks
because this helps them gather your card details (credit/debit), current location, or other
sensitive info. Such attackers use deceptive emails or websites and show them in such a
manner they look legitimate. Spear-phishing, on the other hand, is a sub-part of phishing
and is its more sophisticated version. Here, online fraudulent send malicious emails, and
they are sent to well-researched victims (such victims are analyzed well by the cyber
attackers on the grounds of mental and emotional strengths).
 Growth of Hacktivism: Hacktivism is a combination of words Hack N Activism. In general,
this is done with the purpose of breaking into someone’s computer and steals that
information that supports political or social agendas in the wrong way. The target of
hacktivists is primarily to gain their visibility on the websites of government organizations
and deface their security protocols by promoting their politically influenced cause. No
matter what the intention of the hacktivists was, but such criminal attacks are a slap to
government organizations taking care of the assets of their customers. With this, a sort of
motivation for challenging governments or forcing them to go against their morals is
unknowingly promoted.
 Dronejacking is a New Wave Disturbing Cyber Experts: Dronejacking is a method
cybercriminals use to exploit toy-like drones, gaining control over personal information
easily. According to an Intel report, drones have targeted deliveries, camera crews, and
hobbyists, bypassing enforced security standards. While drones are valuable tools for
farmers, photographers, shippers, and law enforcement agencies, they also pose a new
wave of cyber threats. Dronejacking enables cybercriminals to potentially cause financial
harm to companies like Amazon and UPS, known for supplying essentials. Hackers can
use dronejacking to determine package delivery schedules, posing a serious threat to
consumer success and brand reputation.
 Preventive measures of social engineering: Social engineering is concerned with a type of
cyber-attacks where hackers focus on tricks and non-tech strategies rather than using core
tech approaches or tools to trap the users. There are some preventive measures associated,
and they are setting the spam filters from low to high, instant denial or deletion of help
requests, researching the sources of unsolicited emails, and many more.
 Office People Having Access to Data of their Organizations: Internal politics is something
that everyone is aware of and this happens in every organization. Whether you talk about a
tech-giant or a well-reputed automation agency, employees are assigned with some
privileges and this makes the finances vulnerable to huge losses. All this gives rise to insider
threats. They have grown up by 47 percent in the past 2 years and successfully inviting
cybercriminals to nourish their fraudulent activities well.

10) Explain the World Wide Web (WWW)


o The World Wide Web is abbreviated as WWW and is commonly known as the web. The
WWW was initiated by CERN (European library for Nuclear Research) in 1989.
o WWW can be defined as the collection of different websites around the world, containing
different information shared via local servers (or computers).
History: It is a project created, by Timothy Berner Lee in 1989, for researchers to work together
effectively at CERN. is an organization, named the World Wide Web Consortium (W3C), which
was developed for further development of the web. This organization is directed by Tim
Berner’s Lee, aka the father of the web.
System Architecture: From the user’s point of view, the web consists of a vast, worldwide
connection of documents or web pages. Each page may contain links to other pages anywhere
in the world. The pages can be retrieved and viewed by using browsers of which internet
explorer, Netscape Navigator, Google Chrome, etc are the popular ones. The browser fetches
the page requested interprets the text and formatting commands on it, and displays the page,
properly formatted, on the screen.
Working of WWW: The World Wide Web is based on several different technologies: Web
browsers, Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs which
display text, data, pictures, animation and video on the Internet. Hyperlinked resources on the
World Wide Web can be accessed using software interfaces provided by Web browsers.
Initially, Web browsers were used only for surfing the Web but now they have become more
universal. Web browsers can be used for several tasks including conducting searches, mailing,
transferring files, and much more. Some of the commonly used browsers are Internet Explorer,
Opera Mini, and Google Chrome.
Features of WWW:
 Hypertext Information System
 Cross-Platform
 Distributed

Open Standards and Open Source
 Uses Web Browsers to provide a single interface for many services
 Dynamic, Interactive and Evolving.
 “Web 2.0”
Components of the Web: There are 3 components of the web:
1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. Hypertext Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organization and content
of a webpage.

11) Write the Differences between Internet and WWW:


S.No. INTERNET WWW

1 Internet is a global network of networks. WWW stands for World wide Web.

Internet is a means of connecting a computer to any World Wide Web which is a collection of
2
other computer anywhere in the world. information which is accessed via the Internet.

3 Internet is infrastructure. WWW is service on top of that infrastructure.

Web can be viewed as collection of books on that


4 Internet can be viewed as a big book-store.
store.

At some advanced level, to understand we can think At some advanced level, to understand we can
5
of the Internet as hardware. think of the WWW as software.

WWW is more software-oriented as compared to


6 Internet is primarily hardware-based.
the Internet.

English scientist Tim Berners-Lee invented the


7 It is originated sometimes in late 1960s.
World Wide Web in 1989.

8 Internet is superset of WWW. WWW is a subset of the Internet.

The first version of the Internet was known as


9 In the beginning WWW was known as NSFNET.
ARPANET.

10 Internet uses IP address. WWW uses HTTP.

You might also like