SlideShare a Scribd company logo
1 of 13
Cyber space
Submitted by :- Adithiya Pillai
Submitted to :- Dinesh Kamble
Content…
 Definition of cyber space
 Origin of cyber space
 Threat to cyber space
 Solution for threats
 Advantages of cyber space
 Disadvantages of cyber space
Definition of cyber space
 Cyber space refer to the virtual computer world, and more specially is an
electronic medium used to form a global computer to facilitate online
communication.
 It is large computer network made up by many worldwide computer networks
that employ TCP IP protocol to aid in communication and data exchange
activities.
 In effect , cyber space can be thought of as the interconnection of human
begins through computers and telecommunication, without regard of physical
geography.
Origin of cyber space
 The tern cyber space fist appeared in the visual art in the late 1960s,
when Danish artist Susanne Ussing (1940-1998)and her partner
architect Carsten Hoff constituted themselves as a atelier cyberspace.
Atelier cyberspace worked at a time when the internet did not exist
and computers were more or less off-limit to artists and creative
engagement.
Threats In cyber space
 Cyber crime
 Hacking
 Cyber terrorism
 Cyber espionage
1.Cyber crime
cybercrime is defined as a crime in which a computer is the
object of the crime or is used as a tool to commit an
offense.
Examples – hacking , phishing, spamming , hate crimes etc
2.Hacking
Hacking is the act of breaking into a computer system for a
politically or socially motivated purpose. The individual who
perform an act of hacking is said to be hacker. It can also be
said as unauthorized excess over a system.
3. Cyber terrorism
Cyber terrorism is the use of internet based attacks in
terrorist activities , including acts of deliberate , large scale
disruption of computer networks especially of personal
computers attached to the internet by the means of tools
such as computer.
4. cyber espionage
Unauthorized spying by computer. The term generally refer
to the development of viruses that clandestinely observe or
destroy data in the computer system of government agencies
and large enterprises
Solution for threats
 Use different user idpassword combination for different accounts and
avoid writing them down.
 make the password more complicated by combining letters ,
numbers, special characters( minimum 10 characters in total) an
change them on regular basis.
 Firewalls are the first line of cyber defense ; they block connections
to unknown or bogus sites and will keep out some types of viruses and
hackers.
 Prevent viruses from infecting our computer by installing and regularly
updating anti-virus software.
Advantage of cyber space
 Unlimited communication
 Abundant information and resources
 Easy sharing
 Online services and e-commerce
1.Unlimited communication
The internet has made it easy for people to communicate with other
because it is cheap and convenient. As such people are able to share
their thought and views on matters affecting the globe. The internet acts
as common global platform where people explore ideologies and
cultures without limitation.
2. Abundant information and resources
the internet is swamped with information about anything and everything.
There are multiple searches engines that have made it easier for internet
users to find information. For example it is now common for people to
look for free advice from the internet on all sorts of issues
3.Easy sharing
Internet sharing information is fast and seamless. We can use
social media sites such as Facebook or an IM app for sharing
information , they will all get the news at the same time. We can
also share music, videos, and any other files.
4.Online services and E-commerce
Today it is possible to carry out financial transactions online. We
can transfer funds, pay taxes and utility bills or book movie tickets
over the internet in the comfort of our office or the home.
Disadvantages of cyber space
 Software vulnerabilities
 Data vulnerabilities
 Interruption of privacy
 Remote access
 Crosses all geographical boundaries
 Assists crime
Cyber Space

More Related Content

What's hot

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 

What's hot (20)

Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Cyber Space

Similar to Cyber Space (20)

internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Role Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF MediaRole Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF Media
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet
InternetInternet
Internet
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Essays On The Internet
Essays On The InternetEssays On The Internet
Essays On The Internet
 
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internet
 

More from DINESH KAMBLE

More from DINESH KAMBLE (11)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Cyber Space

  • 1. Cyber space Submitted by :- Adithiya Pillai Submitted to :- Dinesh Kamble
  • 2. Content…  Definition of cyber space  Origin of cyber space  Threat to cyber space  Solution for threats  Advantages of cyber space  Disadvantages of cyber space
  • 3. Definition of cyber space  Cyber space refer to the virtual computer world, and more specially is an electronic medium used to form a global computer to facilitate online communication.  It is large computer network made up by many worldwide computer networks that employ TCP IP protocol to aid in communication and data exchange activities.  In effect , cyber space can be thought of as the interconnection of human begins through computers and telecommunication, without regard of physical geography.
  • 4. Origin of cyber space  The tern cyber space fist appeared in the visual art in the late 1960s, when Danish artist Susanne Ussing (1940-1998)and her partner architect Carsten Hoff constituted themselves as a atelier cyberspace. Atelier cyberspace worked at a time when the internet did not exist and computers were more or less off-limit to artists and creative engagement.
  • 5. Threats In cyber space  Cyber crime  Hacking  Cyber terrorism  Cyber espionage
  • 6. 1.Cyber crime cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Examples – hacking , phishing, spamming , hate crimes etc 2.Hacking Hacking is the act of breaking into a computer system for a politically or socially motivated purpose. The individual who perform an act of hacking is said to be hacker. It can also be said as unauthorized excess over a system.
  • 7. 3. Cyber terrorism Cyber terrorism is the use of internet based attacks in terrorist activities , including acts of deliberate , large scale disruption of computer networks especially of personal computers attached to the internet by the means of tools such as computer. 4. cyber espionage Unauthorized spying by computer. The term generally refer to the development of viruses that clandestinely observe or destroy data in the computer system of government agencies and large enterprises
  • 8. Solution for threats  Use different user idpassword combination for different accounts and avoid writing them down.  make the password more complicated by combining letters , numbers, special characters( minimum 10 characters in total) an change them on regular basis.  Firewalls are the first line of cyber defense ; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.  Prevent viruses from infecting our computer by installing and regularly updating anti-virus software.
  • 9. Advantage of cyber space  Unlimited communication  Abundant information and resources  Easy sharing  Online services and e-commerce
  • 10. 1.Unlimited communication The internet has made it easy for people to communicate with other because it is cheap and convenient. As such people are able to share their thought and views on matters affecting the globe. The internet acts as common global platform where people explore ideologies and cultures without limitation. 2. Abundant information and resources the internet is swamped with information about anything and everything. There are multiple searches engines that have made it easier for internet users to find information. For example it is now common for people to look for free advice from the internet on all sorts of issues
  • 11. 3.Easy sharing Internet sharing information is fast and seamless. We can use social media sites such as Facebook or an IM app for sharing information , they will all get the news at the same time. We can also share music, videos, and any other files. 4.Online services and E-commerce Today it is possible to carry out financial transactions online. We can transfer funds, pay taxes and utility bills or book movie tickets over the internet in the comfort of our office or the home.
  • 12. Disadvantages of cyber space  Software vulnerabilities  Data vulnerabilities  Interruption of privacy  Remote access  Crosses all geographical boundaries  Assists crime