VIRTUAL REALITY VS CYBERSPACE
Virtual reality is the computer-generated simulation of a three-dimensional image or
environment that can be interacted with in a seemingly real or physical way by a
person using special electronic equipment, such as a helmet with a screen inside or
gloves fitted with sensors.
Cyberspace is the notional environment in which communication over computer
networks occurs. Notional means not existing in reality. It represents all the data
stored online in the world of computer networks.
So, cyberspace can be thought of as a virtual reality where one could "walk through"
computer networks.
8/19/2019 Prachi cyber security
CYBERSPACE AS A METAPHOR FOR
INTERNET
Metaphor is a thing regarded as representative or symbolic of something else.
According to this interpretation, events taking place on the Internet are not
happening in the locations where participants or servers are physically located, but
"in cyberspace". So that a website, for example, might be metaphorically said to
"exist in cyberspace.
Cyberspace provides new opportunities to reshape society and culture through
"hidden" identities, or it can be seen as borderless communication and culture.
Cyberspace is the "place" where a telephone conversation appears to occur. Not
inside your actual phone, the plastic device on your desk. Not inside the other
person's phone, in some other city. The place between the phones. [...]
8/19/2019 Prachi cyber security
8/19/2019 Prachi cyber security
The "space" in cyberspace has more in common with the abstract meanings of
the term than physical space. It can be attributed to the relationship between
different pages (of books as well as webservers), considering the unturned
pages to be somewhere "out there."
The metaphor has been useful but the use of cyberspace as a metaphor has
had its limits in areas where the metaphor becomes confused with physical
infrastructure. It has also been critiqued as being unhelpful for falsely
employing a spatial metaphor to describe what is inherently a network.
ELECTROMAGNETIC SPECTRUM
Electromagnetic radiation is
classified by wavelength into
radio wave, microwave,
terahertz (or sub-millimeter)
radiation, infrared, the visible
region that is perceived as
light, ultraviolet, X-rays and
gamma rays. The behavior
of EM radiation depends on its
wavelength
8/19/2019 Prachi cyber security
ESSENTIAL CHARACTERISTICS OF
CYBERSPACE
They are categorized into three classes including space as virtual world, interaction,
and information. Specific features are as follows:
Virtual world
Second life space
Cyberspace is a new domain for second life. It’s different physical space. A User can
make electronic personality as long as they have a time and energy, because
electronic personality consists of user’s information. Based on anonymity, Individual
in web can expresses his or her personality. In cyberspace, a user is able to have
several electronic personalities, and acts them.
Reality of virtual world
A User believes that cyber personality exists and cyberspace is part of real world . The
confidence can make activities on cyberspace fall into a state of absorption. The more
a state of absorption, a boundary between of cyberspace and physical space
disappears. In addition to having a role, people take part in activities on cyberspace. It
makes cyberspace feel more reality.
8/19/2019 Prachi cyber security
Interaction
Social interaction and entertainment
Cyberspace is a new domain for social interaction and entertainment. When it’s used
as private space, common value or idea makes social network. Social interactions of
this kind are chatting on internet community, on-line game, and club on website, and
so on. Through these activities, people throughout world have cyber social interaction.
Community for common interests
People desire space to share their idea and information for business or work. Website
or internet network is used for this. A work or information on web is shared and
utilized for everyone’s each goal.
Public space equality
Web is impartial space. There are not racial or religious or sex prejudice. Horizontal
relationship exists between members in cyberspace. Activities and benefits (Social
communication and information, and so on) on cyberspace are open to everyone who
can use it.
8/19/2019 Prachi cyber security
Destruction of public communications (negative)
People in cyberspace give loose to communicate each other. There is not a supervisor
or controller. So public communication can be break and intergenerational
communication gap is able to become serious. So far, there is not a rule or a regulation
about cyber communication. And anonymity makes control of communication in
cyberspace impossible.
Cyber egoism (negative)
In fact, nobody can control or regulate actions on cyberspace. There is possibility of
cyber egoism and irresponsible behaviors have a negative effect on realities of life. So
far, there is not a rule or a regulation about cyber communication. And nobody can
punish a criminal act on web.
Information Source
Systematizing or structuralizing of information
Information of cyberspace builds up network around nodes. The node means what
kind of information, which contents, and so on. Information on web is systematized or
structuralized around these nodes .
8/19/2019 Prachi cyber security
User as a knowledge creator
In cyberspace, anybody can be a writer or an author, and anybody can show their
music or essay that they have created. Users on web make information as well as take
it. A boundary between user and creator is ambiguous.
Web resource accessibility
Web resource is open to everyone. In cyberspace, information is shared and
circulated free .
Information Standardizing
For more use, Information in cyberspace needs to be standardized . Currently Most of
web contents are produced as standardized form. So user can apply them without
converting.
Hypertext
World Wide Web is huge network that is connected each site as hypertext link.
Through hypertext, without map of information, user can get web resource easily.
8/19/2019 Prachi cyber security
Meta search engines
A metasearch engine (or aggregator) is a search tool that uses another search
engine's data to produce their own results from the Internet. Metasearch
engines take input from a user and simultaneously send out queries to third
party search engines for results.
8/19/2019 Prachi cyber security
CYBER INFRASTRUCTURE
RELATIONSHIP
8/19/2019 Prachi cyber security
Infrastructure is a fundamentally relational concept, relational means the way in
which two or more people or things are connected. It is marked by ambiguity and
multiple meanings.
An infrastructure occurs when the tension between local and global is resolved.
That is, an infrastructure occurs when local practices are afforded by a larger-scale
technology which can then be used in a natural, ready-to-hand fashion .
Like recently there have been terms like “grid computing”, “e-science”..etc we refer
to these as “cyberinfrastructure,” .These projects have attracted significant
investment from major funding agencies, substantial participation from domain
scientists, and considerable interest from researchers whose practice focuses on
issues in computer-supported cooperative work and science studies. “
Relationships in cyberinfrastructure are temporal as their properties change over
time.
8/19/2019 Prachi cyber security
Aspects of relationship in cyberinfrastructure are:
• Embeddedness:
infrastructures depend on a range of existing technical and social structures for
identity and function.
• Transparency:
infrastructure invisibly supports tasks without needing to be assembled or reinvented
for each task.
• Reach or Scope:
infrastructure reaches beyond a single event of one-site practice, and may be either
spatial or temporal.
• Learned as a part of membership:
artifacts and organizational arrangements come to be taken for granted by members.
Linked with conventions for practice: infrastructure both shapes, and is shaped by,
the conventions of a community of practice.
• Embodiment of standards:
Modified by conflicting conventions, infrastructure takes on transparency by plugging
into other infrastructures and tools in a standardized fashion.
8/19/2019 Prachi cyber security
• Installed base:
Infrastructures depend on previous ones, and on existing systems of support,
funding, training, and expertise.
• Visible upon breakdown:
generally when infrastructure breaks down it is noticed; otherwise it is largely
invisible.

Cyberspace

  • 1.
    VIRTUAL REALITY VSCYBERSPACE Virtual reality is the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors. Cyberspace is the notional environment in which communication over computer networks occurs. Notional means not existing in reality. It represents all the data stored online in the world of computer networks. So, cyberspace can be thought of as a virtual reality where one could "walk through" computer networks. 8/19/2019 Prachi cyber security
  • 2.
    CYBERSPACE AS AMETAPHOR FOR INTERNET Metaphor is a thing regarded as representative or symbolic of something else. According to this interpretation, events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace". So that a website, for example, might be metaphorically said to "exist in cyberspace. Cyberspace provides new opportunities to reshape society and culture through "hidden" identities, or it can be seen as borderless communication and culture. Cyberspace is the "place" where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk. Not inside the other person's phone, in some other city. The place between the phones. [...] 8/19/2019 Prachi cyber security
  • 3.
    8/19/2019 Prachi cybersecurity The "space" in cyberspace has more in common with the abstract meanings of the term than physical space. It can be attributed to the relationship between different pages (of books as well as webservers), considering the unturned pages to be somewhere "out there." The metaphor has been useful but the use of cyberspace as a metaphor has had its limits in areas where the metaphor becomes confused with physical infrastructure. It has also been critiqued as being unhelpful for falsely employing a spatial metaphor to describe what is inherently a network.
  • 4.
    ELECTROMAGNETIC SPECTRUM Electromagnetic radiationis classified by wavelength into radio wave, microwave, terahertz (or sub-millimeter) radiation, infrared, the visible region that is perceived as light, ultraviolet, X-rays and gamma rays. The behavior of EM radiation depends on its wavelength 8/19/2019 Prachi cyber security
  • 5.
    ESSENTIAL CHARACTERISTICS OF CYBERSPACE Theyare categorized into three classes including space as virtual world, interaction, and information. Specific features are as follows: Virtual world Second life space Cyberspace is a new domain for second life. It’s different physical space. A User can make electronic personality as long as they have a time and energy, because electronic personality consists of user’s information. Based on anonymity, Individual in web can expresses his or her personality. In cyberspace, a user is able to have several electronic personalities, and acts them. Reality of virtual world A User believes that cyber personality exists and cyberspace is part of real world . The confidence can make activities on cyberspace fall into a state of absorption. The more a state of absorption, a boundary between of cyberspace and physical space disappears. In addition to having a role, people take part in activities on cyberspace. It makes cyberspace feel more reality. 8/19/2019 Prachi cyber security
  • 6.
    Interaction Social interaction andentertainment Cyberspace is a new domain for social interaction and entertainment. When it’s used as private space, common value or idea makes social network. Social interactions of this kind are chatting on internet community, on-line game, and club on website, and so on. Through these activities, people throughout world have cyber social interaction. Community for common interests People desire space to share their idea and information for business or work. Website or internet network is used for this. A work or information on web is shared and utilized for everyone’s each goal. Public space equality Web is impartial space. There are not racial or religious or sex prejudice. Horizontal relationship exists between members in cyberspace. Activities and benefits (Social communication and information, and so on) on cyberspace are open to everyone who can use it. 8/19/2019 Prachi cyber security
  • 7.
    Destruction of publiccommunications (negative) People in cyberspace give loose to communicate each other. There is not a supervisor or controller. So public communication can be break and intergenerational communication gap is able to become serious. So far, there is not a rule or a regulation about cyber communication. And anonymity makes control of communication in cyberspace impossible. Cyber egoism (negative) In fact, nobody can control or regulate actions on cyberspace. There is possibility of cyber egoism and irresponsible behaviors have a negative effect on realities of life. So far, there is not a rule or a regulation about cyber communication. And nobody can punish a criminal act on web. Information Source Systematizing or structuralizing of information Information of cyberspace builds up network around nodes. The node means what kind of information, which contents, and so on. Information on web is systematized or structuralized around these nodes . 8/19/2019 Prachi cyber security
  • 8.
    User as aknowledge creator In cyberspace, anybody can be a writer or an author, and anybody can show their music or essay that they have created. Users on web make information as well as take it. A boundary between user and creator is ambiguous. Web resource accessibility Web resource is open to everyone. In cyberspace, information is shared and circulated free . Information Standardizing For more use, Information in cyberspace needs to be standardized . Currently Most of web contents are produced as standardized form. So user can apply them without converting. Hypertext World Wide Web is huge network that is connected each site as hypertext link. Through hypertext, without map of information, user can get web resource easily. 8/19/2019 Prachi cyber security
  • 9.
    Meta search engines Ametasearch engine (or aggregator) is a search tool that uses another search engine's data to produce their own results from the Internet. Metasearch engines take input from a user and simultaneously send out queries to third party search engines for results. 8/19/2019 Prachi cyber security
  • 10.
    CYBER INFRASTRUCTURE RELATIONSHIP 8/19/2019 Prachicyber security Infrastructure is a fundamentally relational concept, relational means the way in which two or more people or things are connected. It is marked by ambiguity and multiple meanings. An infrastructure occurs when the tension between local and global is resolved. That is, an infrastructure occurs when local practices are afforded by a larger-scale technology which can then be used in a natural, ready-to-hand fashion . Like recently there have been terms like “grid computing”, “e-science”..etc we refer to these as “cyberinfrastructure,” .These projects have attracted significant investment from major funding agencies, substantial participation from domain scientists, and considerable interest from researchers whose practice focuses on issues in computer-supported cooperative work and science studies. “ Relationships in cyberinfrastructure are temporal as their properties change over time.
  • 11.
    8/19/2019 Prachi cybersecurity Aspects of relationship in cyberinfrastructure are: • Embeddedness: infrastructures depend on a range of existing technical and social structures for identity and function. • Transparency: infrastructure invisibly supports tasks without needing to be assembled or reinvented for each task. • Reach or Scope: infrastructure reaches beyond a single event of one-site practice, and may be either spatial or temporal. • Learned as a part of membership: artifacts and organizational arrangements come to be taken for granted by members. Linked with conventions for practice: infrastructure both shapes, and is shaped by, the conventions of a community of practice. • Embodiment of standards: Modified by conflicting conventions, infrastructure takes on transparency by plugging into other infrastructures and tools in a standardized fashion.
  • 12.
    8/19/2019 Prachi cybersecurity • Installed base: Infrastructures depend on previous ones, and on existing systems of support, funding, training, and expertise. • Visible upon breakdown: generally when infrastructure breaks down it is noticed; otherwise it is largely invisible.