0% found this document useful (0 votes)
53 views16 pages

Session 2 - Cyberspace, Internet and Technology

Cyberspace refers to the online world enabled by computers and the internet. It allows for global interaction, information sharing, and social connection regardless of physical location. Key aspects of cyberspace include online communities known as netizens, security threats like hacking and cybercrime, and how quickly the internet has spread compared to other technologies.

Uploaded by

Sagar Bhardwaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views16 pages

Session 2 - Cyberspace, Internet and Technology

Cyberspace refers to the online world enabled by computers and the internet. It allows for global interaction, information sharing, and social connection regardless of physical location. Key aspects of cyberspace include online communities known as netizens, security threats like hacking and cybercrime, and how quickly the internet has spread compared to other technologies.

Uploaded by

Sagar Bhardwaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Cyberspace, Internet

and Technology
Cyberspace
The word became popular in the 1990s
• Networking
• Internet
• Digital communication

The term cyberspace has become a conventional


means to describe anything associated with the
Internet and the diverse Internet culture.
Cyberspace
Cyberspace is the electronic medium of computer
networks, in which online communication takes place and
where as a part of social experience, individuals can interact,
exchange ideas, share information, provide social support,
conduct business, direct actions, create artistic media, play
games, engage in political discussion, and so on, using this
global network.

Cyberspace consists of
a) IT Infrastructures such as computer systems, integrated
sensors, system control networks, embedded processors
b) ?
Cyberspace
Cyberspace is defined more by the social interactions
involved rather than its technical implementation.

In their view, the computational medium in cyberspace is an


augmentation of the communication channel between real
people; the core characteristic of cyberspace is that it offers
an environment that consists of many participants with the
ability to affect and influence each other.

Virtual Space – Where Internet Works – and there is


Interconnection of Human Beings- through Computer
and Telecommunication-irrespective of Physical
Geography
Growth of Cyberspace
Cyberspace: Internet is spreading at an unprecedented
speed:
 Electricity was first harnessed in 1831, but it was not
until 1882 that the first power station was built. Then
it took another 50 years before reaching 80 per cent
of the United States.
 Radio took 38 years to be used by 50 million people.
 TV took 13 years to reach 50 million people.
 Whereas, PC took 16 years to reach 50 million people.
 However, the Internet took only 4 years to have 50
million people on-line.
What is Cyberspace: Main Features
1. Just like the real world comprises the entire earth,
Cyberspace consists of the entire virtual world.
2. The ICTs, Computers and Internet Technology are
expanding the boundaries of Cyberspace day by day.
3. Unlike the problems in the real world, it is very easy to
roam around in the Cyberspace on “information
superhighways.”
4. The speed is tremendous, the reach unlimited. There
is ease of entry and exit.
5. Very less resources are needed to enter Cyberspace.
6. Easy to disguise one’s identity in Cyberspace.
7. Cyberspace and Real world impact each other.
Netizens
Persons in Cyberspace are called Netizens.

Sometimes referred to as cybernauts.

Anyone who is associated with computers, IT and Internet.

• School has uniform

• Code of shared rules and ethics mutually beneficial for all to


follow, referred to as cyberethics.

Such moral responsibilities go hand in hand when working


online with global networks, specifically, when opinions are
involved with online social experiences.
Hacking

• Obsessive use of computers


• Unauthorized access and use of networked
computer systems
• Electronic Breaking and Entering
– Accessing without stealing nor damaging
• Cracker (black hat or dark side hacker)
– Maintains knowledge of vulnerabilities for private
advantage
• Common Hacking Tactics
Common Hacking Tactics
• Denial of service
• Scans
• Sniffer
• Spoofing
• Trojan Horse
• Back doors
• Malicious applets
• War dialing
• Password crackers
• Social Engineering
• Dumpster Diving
Security from Cyber Crime
Cyber Theft
• Most involve theft of money
• “Inside jobs”
• Unauthorized activity
• Attacks through the Internet
• Most companies don’t report
Cyber-terrorism
• Use IT to attack electronic infrastructure, exchange
information or make threats
• Terror related
– More political motivation than criminal
• Examples
– Attempt to disrupt life support at Antarctic research
station
– Release of untreated sewage in Australia
– Shut down of government network and banks in Estonia
– Non-deliberate shut down of systems at nuclear reactor
Software Piracy
• Unauthorized copying of computer programs
• Licensing
– Purchase – payment for fair use
– Site license – allows a certain number of copies
– Shareware – allows copies
– Public Domain – not copyrighted
• Software industry losses
– ⅓ to ½ of revenues
– Millions of copies in educational market
– 90% pirated software in China
• Sales negligible
Theft of Intellectual Property

• Intellectual Property
– Copyrighted material
– Music, videos, images, articles, books, software
• Copyright Infringement is Illegal
– Easy to trade pirated intellectual property
• Publishers Offer Inexpensive Online Music
– Illegal downloading is declining
Viruses and Worms

• Viruses must be inserted into another


program
• Worms can run unaided
• Spread annoying or destructive routines
• Commonly transmitted through
– Internet and online services
– Email and file attachments
– Disks from contaminated computers
– Shareware
Adware and Spyware
• Adware
– Useful software allows ads without consent
• Spyware
– Type of Adware
– Can steal private information
– Add advertising links to Web pages
– Redirect affiliate payments
– Change a users home page and search settings
– Make modem call premium-rate numbers
– Leave security holes that let Trojans in
– Degrade system performance
• Removal often not completely successful

You might also like