SlideShare a Scribd company logo
1 of 16
Download to read offline
➢Cyberspace refers to the virtual computer world, and
more specifically, is an electronic medium used to form
a global computer network to facilitate online
communication.
➢It is a large computer network made up of many
worldwide computer networks that employ TCP/IP
protocol to aid in communication and data exchange
activities.
➢Cyberspace's core feature is an interactive and virtual
environment for a broad range of participants.
➢Hacktivism
➢Cybercrime
➢Cyberespionage
➢Cyberterrorism
Hacktivism is the act of hacking, or breaking
into a computer system, for a politically or socially
motivated purpose. The individual who performs an
act of hacktivism is said to be a hacktivist.
Acts of hacktivism may include website
defacement, denial-of-service attacks (DoS), website
parodies, information theft, virtual sabotage and
virtual sit-ins.
❖Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offense (child pornography, hate crimes).
❖Cybercriminals may use computer technology to access
personal information, business trade secrets, or use the Internet
for exploitive or malicious purposes.
❖ Criminals can also use computers for communication and
document or data storage.
❖Criminals who perform these illegal activities are often
referred to as hackers.
Unauthorized spying by computer. The
term generally refers to the deployment
of viruses that clandestinely observe or
destroy data in the computer systems of
government agencies and large
enterprises.
➢Informational resources
➢Entertainment
➢Social networking
Informational resources
The Internet is a virtual library of information.
We can get any kind of information on any topic that
we desire, it will be available on the Internet.
Entertainment
Entertainment is another popular reason why
many people prefer to surf the Internet. We can
download games and music instead of going out of our
comfort zone to get the latest and the game or CD.
There are numerous games that can be downloaded for
free.
Social networking also plays a major role
in cyberspace. One cannot imagine an
online life without Facebook or Twitter.
Social networking has become so popular
amongst youth that it might one day
replace physical networking. It has
evolved as a great medium to connect
with millions of people with similar
interests.
Personal Information: If we use the Internet, our
personal information such as name, address, etc. can be
accessed by other people. If we use a credit card to shop
online, then our credit card information can also be
‘stolen’ which could be akin to giving someone a blank
check.
Spamming
This
unsolicited
refers to sending
e-mails in bulk, which
serve no purpose and unnecessarily
clog up the entire system.
Use different user ID / password
combinations for different accounts and avoid writing
them down. Make the passwords more complicated by
combining letters, numbers, special characters (minimum
10 characters in total) and change them on a regular
basis.
➢Firewalls are the first line of cyber defense;
they block connections to unknown or bogus
sites and will keep out some types of viruses and
hackers.
➢Prevent viruses from infecting our computer
by installing and regularly updating anti-virus
software.
➢Prevent spyware from infiltrating our
computer by installing and updating anti-
spyware software
➢Make sure your social networking profiles (e.g. Face
book, Twitter, YouTube, MSN, etc.) are set to private.
Check your security settings. Be careful what
information you post online. Once it is on the
Internet, it is there forever!
➢Be aware that your mobile device is vulnerable to
viruses and hackers. Download applications from
trusted sources.
cyber space.pdf

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber law
Cyber lawCyber law
Cyber law
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Similar to cyber space.pdf

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 

Similar to cyber space.pdf (20)

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

More from Yashwanth Rm

Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...Yashwanth Rm
 
income statement.pptx
income statement.pptxincome statement.pptx
income statement.pptxYashwanth Rm
 
statement of change in equity.pptx
statement of change in equity.pptxstatement of change in equity.pptx
statement of change in equity.pptxYashwanth Rm
 
business ethics ppt.pdf
business ethics ppt.pdfbusiness ethics ppt.pdf
business ethics ppt.pdfYashwanth Rm
 
tax aspects in investment (1).pdf
tax aspects in investment (1).pdftax aspects in investment (1).pdf
tax aspects in investment (1).pdfYashwanth Rm
 
riskandreturnmeasurement.pdf
riskandreturnmeasurement.pdfriskandreturnmeasurement.pdf
riskandreturnmeasurement.pdfYashwanth Rm
 
review of literature.pptx
review of literature.pptxreview of literature.pptx
review of literature.pptxYashwanth Rm
 
4 Presentation Skills.pptx
4 Presentation Skills.pptx4 Presentation Skills.pptx
4 Presentation Skills.pptxYashwanth Rm
 
comparative stmnt.pdf
comparative stmnt.pdfcomparative stmnt.pdf
comparative stmnt.pdfYashwanth Rm
 
ozone and carbon trade.pptx
ozone and carbon trade.pptxozone and carbon trade.pptx
ozone and carbon trade.pptxYashwanth Rm
 
value chain analysis.pdf
value chain analysis.pdfvalue chain analysis.pdf
value chain analysis.pdfYashwanth Rm
 
methods of data collection research methodology.pdf
methods of data collection research methodology.pdfmethods of data collection research methodology.pdf
methods of data collection research methodology.pdfYashwanth Rm
 
discriminant analysis.pdf
discriminant analysis.pdfdiscriminant analysis.pdf
discriminant analysis.pdfYashwanth Rm
 
data collection.pdf
data collection.pdfdata collection.pdf
data collection.pdfYashwanth Rm
 

More from Yashwanth Rm (20)

Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...
 
income statement.pptx
income statement.pptxincome statement.pptx
income statement.pptx
 
statement of change in equity.pptx
statement of change in equity.pptxstatement of change in equity.pptx
statement of change in equity.pptx
 
business ethics ppt.pdf
business ethics ppt.pdfbusiness ethics ppt.pdf
business ethics ppt.pdf
 
tax aspects in investment (1).pdf
tax aspects in investment (1).pdftax aspects in investment (1).pdf
tax aspects in investment (1).pdf
 
riskandreturnmeasurement.pdf
riskandreturnmeasurement.pdfriskandreturnmeasurement.pdf
riskandreturnmeasurement.pdf
 
review of literature.pptx
review of literature.pptxreview of literature.pptx
review of literature.pptx
 
Mod 2.pptx
Mod 2.pptxMod 2.pptx
Mod 2.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Mod.pptx
Mod.pptxMod.pptx
Mod.pptx
 
Cash Book.pdf
Cash Book.pdfCash Book.pdf
Cash Book.pdf
 
4 Presentation Skills.pptx
4 Presentation Skills.pptx4 Presentation Skills.pptx
4 Presentation Skills.pptx
 
comparative stmnt.pdf
comparative stmnt.pdfcomparative stmnt.pdf
comparative stmnt.pdf
 
Acct jargons.pptx
Acct jargons.pptxAcct jargons.pptx
Acct jargons.pptx
 
Global ADVT.pdf
Global ADVT.pdfGlobal ADVT.pdf
Global ADVT.pdf
 
ozone and carbon trade.pptx
ozone and carbon trade.pptxozone and carbon trade.pptx
ozone and carbon trade.pptx
 
value chain analysis.pdf
value chain analysis.pdfvalue chain analysis.pdf
value chain analysis.pdf
 
methods of data collection research methodology.pdf
methods of data collection research methodology.pdfmethods of data collection research methodology.pdf
methods of data collection research methodology.pdf
 
discriminant analysis.pdf
discriminant analysis.pdfdiscriminant analysis.pdf
discriminant analysis.pdf
 
data collection.pdf
data collection.pdfdata collection.pdf
data collection.pdf
 

Recently uploaded

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 

cyber space.pdf

  • 1.
  • 2. ➢Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. ➢It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. ➢Cyberspace's core feature is an interactive and virtual environment for a broad range of participants.
  • 4. Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. Acts of hacktivism may include website defacement, denial-of-service attacks (DoS), website parodies, information theft, virtual sabotage and virtual sit-ins.
  • 5. ❖Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). ❖Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. ❖ Criminals can also use computers for communication and document or data storage. ❖Criminals who perform these illegal activities are often referred to as hackers.
  • 6. Unauthorized spying by computer. The term generally refers to the deployment of viruses that clandestinely observe or destroy data in the computer systems of government agencies and large enterprises.
  • 7.
  • 9. Informational resources The Internet is a virtual library of information. We can get any kind of information on any topic that we desire, it will be available on the Internet. Entertainment Entertainment is another popular reason why many people prefer to surf the Internet. We can download games and music instead of going out of our comfort zone to get the latest and the game or CD. There are numerous games that can be downloaded for free.
  • 10. Social networking also plays a major role in cyberspace. One cannot imagine an online life without Facebook or Twitter. Social networking has become so popular amongst youth that it might one day replace physical networking. It has evolved as a great medium to connect with millions of people with similar interests.
  • 11. Personal Information: If we use the Internet, our personal information such as name, address, etc. can be accessed by other people. If we use a credit card to shop online, then our credit card information can also be ‘stolen’ which could be akin to giving someone a blank check.
  • 12. Spamming This unsolicited refers to sending e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system.
  • 13. Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.
  • 14. ➢Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. ➢Prevent viruses from infecting our computer by installing and regularly updating anti-virus software. ➢Prevent spyware from infiltrating our computer by installing and updating anti- spyware software
  • 15. ➢Make sure your social networking profiles (e.g. Face book, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever! ➢Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.