Cybersecurity An Introduction
Cybersecurity An Introduction
Introduction
Welcome to this introductory presentation on cybersecurity.
We will explore the evolving landscape of cyberspace and
the crucial role of cybersecurity in protecting our digital
world.
Defining Cyberspace
Origins Virtual Space
The term "Cyberspace" was coined by William Cyberspace is a dynamic space created by
Gibson in 1984. It refers to the environment where machine clones, mainly referring to computer
communication over computer networks occurs. networks as a virtual medium for online
communication.
Overview of Computer
and Web Technology
1 Hardware 2 Software
Computers consist of Software includes the
physical components operating system and
like the CPU, memory, various applications
storage devices, that run on a
input/output devices, computer.
and more.
3 Networking
Computers connect to each other and the internet via
wired or wireless networks.
Web Technology
World Wide Web Web Browsers
The World Wide Web, or Web browsers like
web, is a global system Google Chrome, Mozilla
of interconnected Firefox, and Microsoft
documents and Edge allow users to
resources linked through access and interact with
hyperlinks. web content.
Web Development
Web development involves creating and maintaining
websites and web applications.
Architecture of Cyberspace
2 Web Browsers
Web browsers are software applications that enable users
to access and interact with websites and web-based
applications.
3 Websites
Websites are collections of web pages that are hosted on
web servers and can be accessed through a web browser.
Internet Infrastructure
Backbone Networks
High-speed networks forming the core of the internet, connecting major data centers and internet exchange points (IXPs).
Last-Mile Connectivity
The connection from service providers to end-users, including wired and wireless technologies.
Data Centers
Facilities that house servers and storage devices, providing the infrastructure for web hosting, cloud computing, and data storage.
Concept of Cybersecurity
1 Confidentiality
2 Integrity
3 Availability
4 Authentication
Cybersecurity practices aim to safeguard digital information and ensure the confidentiality, integrity, and
availability of data.
Cyber Threats and Attacks
1 Cyber Threats
2 Web-Based Attacks
3 System-Based Attacks
A cyber threat is any malicious act that attempts to gain access to a computer network without
authorization. A cyber attack is an exploitation of computer systems and networks.
Issues and Challenges of
Cybersecurity
1 2
Cyber Attacks Data Breaches
3 4
Security Vulnerabilities Insider Threats