SlideShare a Scribd company logo
Cyber space
Submitted by :- Adithiya Pillai
Submitted to :- Dinesh Kamble
Content…
 Definition of cyber space
 Origin of cyber space
 Threat to cyber space
 Solution for threats
 Advantages of cyber space
 Disadvantages of cyber space
Definition of cyber space
 Cyber space refer to the virtual computer world, and more specially is an
electronic medium used to form a global computer to facilitate online
communication.
 It is large computer network made up by many worldwide computer networks
that employ TCP IP protocol to aid in communication and data exchange
activities.
 In effect , cyber space can be thought of as the interconnection of human
begins through computers and telecommunication, without regard of physical
geography.
Origin of cyber space
 The tern cyber space fist appeared in the visual art in the late 1960s,
when Danish artist Susanne Ussing (1940-1998)and her partner
architect Carsten Hoff constituted themselves as a atelier cyberspace.
Atelier cyberspace worked at a time when the internet did not exist
and computers were more or less off-limit to artists and creative
engagement.
Threats In cyber space
 Cyber crime
 Hacking
 Cyber terrorism
 Cyber espionage
1.Cyber crime
cybercrime is defined as a crime in which a computer is the
object of the crime or is used as a tool to commit an
offense.
Examples – hacking , phishing, spamming , hate crimes etc
2.Hacking
Hacking is the act of breaking into a computer system for a
politically or socially motivated purpose. The individual who
perform an act of hacking is said to be hacker. It can also be
said as unauthorized excess over a system.
3. Cyber terrorism
Cyber terrorism is the use of internet based attacks in
terrorist activities , including acts of deliberate , large scale
disruption of computer networks especially of personal
computers attached to the internet by the means of tools
such as computer.
4. cyber espionage
Unauthorized spying by computer. The term generally refer
to the development of viruses that clandestinely observe or
destroy data in the computer system of government agencies
and large enterprises
Solution for threats
 Use different user idpassword combination for different accounts and
avoid writing them down.
 make the password more complicated by combining letters ,
numbers, special characters( minimum 10 characters in total) an
change them on regular basis.
 Firewalls are the first line of cyber defense ; they block connections
to unknown or bogus sites and will keep out some types of viruses and
hackers.
 Prevent viruses from infecting our computer by installing and regularly
updating anti-virus software.
Advantage of cyber space
 Unlimited communication
 Abundant information and resources
 Easy sharing
 Online services and e-commerce
1.Unlimited communication
The internet has made it easy for people to communicate with other
because it is cheap and convenient. As such people are able to share
their thought and views on matters affecting the globe. The internet acts
as common global platform where people explore ideologies and
cultures without limitation.
2. Abundant information and resources
the internet is swamped with information about anything and everything.
There are multiple searches engines that have made it easier for internet
users to find information. For example it is now common for people to
look for free advice from the internet on all sorts of issues
3.Easy sharing
Internet sharing information is fast and seamless. We can use
social media sites such as Facebook or an IM app for sharing
information , they will all get the news at the same time. We can
also share music, videos, and any other files.
4.Online services and E-commerce
Today it is possible to carry out financial transactions online. We
can transfer funds, pay taxes and utility bills or book movie tickets
over the internet in the comfort of our office or the home.
Disadvantages of cyber space
 Software vulnerabilities
 Data vulnerabilities
 Interruption of privacy
 Remote access
 Crosses all geographical boundaries
 Assists crime
Cyber Space

More Related Content

What's hot

Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cyber law
Cyber lawCyber law
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Altacit Global
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
gururaj lulkarni
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 

What's hot (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber Space

internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
HaithamNagy
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
Emilio Fer Villa
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
Anirudh Damani
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
Yashwanth Rm
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
Yashwanth Rm
 
Cyber law
Cyber lawCyber law
Role Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF MediaRole Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF Media
Ansar Gill
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
ASAD AHMED
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
Paper Writing Service Cheap
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
ssuser1facb81
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Internet
InternetInternet
Internet
NeilfieOrit2
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Internet ppt
Internet pptInternet ppt
Internet ppt
sushruth kamarushi
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Essays On The Internet
Essays On The InternetEssays On The Internet
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internet
ArpitDalal8
 
Essay Of Internet
Essay Of InternetEssay Of Internet

Similar to Cyber Space (20)

internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Role Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF MediaRole Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF Media
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet
InternetInternet
Internet
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Essays On The Internet
Essays On The InternetEssays On The Internet
Essays On The Internet
 
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internet
 
Essay Of Internet
Essay Of InternetEssay Of Internet
Essay Of Internet
 

More from DINESH KAMBLE

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
DINESH KAMBLE
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
DINESH KAMBLE
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
DINESH KAMBLE
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
OSI Model
OSI ModelOSI Model
OSI Model
DINESH KAMBLE
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
DINESH KAMBLE
 
Memory
MemoryMemory
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
DINESH KAMBLE
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 

More from DINESH KAMBLE (10)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Recently uploaded

ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 

Recently uploaded (20)

ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 

Cyber Space

  • 1. Cyber space Submitted by :- Adithiya Pillai Submitted to :- Dinesh Kamble
  • 2. Content…  Definition of cyber space  Origin of cyber space  Threat to cyber space  Solution for threats  Advantages of cyber space  Disadvantages of cyber space
  • 3. Definition of cyber space  Cyber space refer to the virtual computer world, and more specially is an electronic medium used to form a global computer to facilitate online communication.  It is large computer network made up by many worldwide computer networks that employ TCP IP protocol to aid in communication and data exchange activities.  In effect , cyber space can be thought of as the interconnection of human begins through computers and telecommunication, without regard of physical geography.
  • 4. Origin of cyber space  The tern cyber space fist appeared in the visual art in the late 1960s, when Danish artist Susanne Ussing (1940-1998)and her partner architect Carsten Hoff constituted themselves as a atelier cyberspace. Atelier cyberspace worked at a time when the internet did not exist and computers were more or less off-limit to artists and creative engagement.
  • 5. Threats In cyber space  Cyber crime  Hacking  Cyber terrorism  Cyber espionage
  • 6. 1.Cyber crime cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Examples – hacking , phishing, spamming , hate crimes etc 2.Hacking Hacking is the act of breaking into a computer system for a politically or socially motivated purpose. The individual who perform an act of hacking is said to be hacker. It can also be said as unauthorized excess over a system.
  • 7. 3. Cyber terrorism Cyber terrorism is the use of internet based attacks in terrorist activities , including acts of deliberate , large scale disruption of computer networks especially of personal computers attached to the internet by the means of tools such as computer. 4. cyber espionage Unauthorized spying by computer. The term generally refer to the development of viruses that clandestinely observe or destroy data in the computer system of government agencies and large enterprises
  • 8. Solution for threats  Use different user idpassword combination for different accounts and avoid writing them down.  make the password more complicated by combining letters , numbers, special characters( minimum 10 characters in total) an change them on regular basis.  Firewalls are the first line of cyber defense ; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.  Prevent viruses from infecting our computer by installing and regularly updating anti-virus software.
  • 9. Advantage of cyber space  Unlimited communication  Abundant information and resources  Easy sharing  Online services and e-commerce
  • 10. 1.Unlimited communication The internet has made it easy for people to communicate with other because it is cheap and convenient. As such people are able to share their thought and views on matters affecting the globe. The internet acts as common global platform where people explore ideologies and cultures without limitation. 2. Abundant information and resources the internet is swamped with information about anything and everything. There are multiple searches engines that have made it easier for internet users to find information. For example it is now common for people to look for free advice from the internet on all sorts of issues
  • 11. 3.Easy sharing Internet sharing information is fast and seamless. We can use social media sites such as Facebook or an IM app for sharing information , they will all get the news at the same time. We can also share music, videos, and any other files. 4.Online services and E-commerce Today it is possible to carry out financial transactions online. We can transfer funds, pay taxes and utility bills or book movie tickets over the internet in the comfort of our office or the home.
  • 12. Disadvantages of cyber space  Software vulnerabilities  Data vulnerabilities  Interruption of privacy  Remote access  Crosses all geographical boundaries  Assists crime