Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Cyberspace Threats and solutions

Published in: Education
  • Be the first to comment


  1. 1. U.Utchimahali ComputerScience
  2. 2. Definition Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace's core feature is an interactive and virtual environment for a broad range of participants.
  3. 3. Threats in Cyberspace Hacktivism Cybercrime Cyberespionage Cyberterrorism
  4. 4. Hacktivism Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. Acts of hacktivism may include website defacement, denial-of-service attacks (DoS), website parodies, information theft, virtual sabotage and virtual sit-ins.
  5. 5. Cybercrime Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes.  Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.
  6. 6. Cyber espionage Unauthorized spying by computer. The term generally refers to the deployment of viruses that clandestinely observe or destroy data in the computer systems of government agencies and large enterprises.
  7. 7. Cyber terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  8. 8. Advantages of Cyberspace Informational resources Entertainment Social networking
  9. 9. Informational resources The Internet is a virtual library of information. We can get any kind of information on any topic that we desire, it will be available on the Internet. Entertainment Entertainment is another popular reason why many people prefer to surf the Internet. We can download games and music instead of going out of our comfort zone to get the latest and the game or CD. There are numerous games that can be downloaded for free.
  10. 10. Social networking Social networking also plays a major role in cyberspace. One cannot imagine an online life without Facebook or Twitter. Social networking has become so popular amongst youth that it might one day replace physical networking. It has evolved as a great medium to connect with millions of people with similar interests.
  11. 11. Disadvantages of Cyberspace Personal Information: If we use the Internet, our personal information such as name, address, etc. can be accessed by other people. If we use a credit card to shop online, then our credit card information can also be ‘stolen’ which could be akin to giving someone a blank check.
  12. 12. Pornography This is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet.
  13. 13. Spamming This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system.
  14. 14. Use Strong Passwords: Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.
  15. 15. Secure your computer Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. Prevent viruses from infecting our computer by installing and regularly updating anti-virus software. Prevent spyware from infiltrating our computer by installing and updating anti- spyware software
  16. 16. Make sure your social networking profiles (e.g. Face book, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever! Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.