SlideShare a Scribd company logo
VIRTUAL REALITY VS CYBERSPACE
Virtual reality is the computer-generated simulation of a three-dimensional image or
environment that can be interacted with in a seemingly real or physical way by a
person using special electronic equipment, such as a helmet with a screen inside or
gloves fitted with sensors.
Cyberspace is the notional environment in which communication over computer
networks occurs. Notional means not existing in reality. It represents all the data
stored online in the world of computer networks.
So, cyberspace can be thought of as a virtual reality where one could "walk through"
computer networks.
8/19/2019 Prachi cyber security
CYBERSPACE AS A METAPHOR FOR
INTERNET
Metaphor is a thing regarded as representative or symbolic of something else.
According to this interpretation, events taking place on the Internet are not
happening in the locations where participants or servers are physically located, but
"in cyberspace". So that a website, for example, might be metaphorically said to
"exist in cyberspace.
Cyberspace provides new opportunities to reshape society and culture through
"hidden" identities, or it can be seen as borderless communication and culture.
Cyberspace is the "place" where a telephone conversation appears to occur. Not
inside your actual phone, the plastic device on your desk. Not inside the other
person's phone, in some other city. The place between the phones. [...]
8/19/2019 Prachi cyber security
8/19/2019 Prachi cyber security
The "space" in cyberspace has more in common with the abstract meanings of
the term than physical space. It can be attributed to the relationship between
different pages (of books as well as webservers), considering the unturned
pages to be somewhere "out there."
The metaphor has been useful but the use of cyberspace as a metaphor has
had its limits in areas where the metaphor becomes confused with physical
infrastructure. It has also been critiqued as being unhelpful for falsely
employing a spatial metaphor to describe what is inherently a network.
ELECTROMAGNETIC SPECTRUM
Electromagnetic radiation is
classified by wavelength into
radio wave, microwave,
terahertz (or sub-millimeter)
radiation, infrared, the visible
region that is perceived as
light, ultraviolet, X-rays and
gamma rays. The behavior
of EM radiation depends on its
wavelength
8/19/2019 Prachi cyber security
ESSENTIAL CHARACTERISTICS OF
CYBERSPACE
They are categorized into three classes including space as virtual world, interaction,
and information. Specific features are as follows:
Virtual world
Second life space
Cyberspace is a new domain for second life. It’s different physical space. A User can
make electronic personality as long as they have a time and energy, because
electronic personality consists of user’s information. Based on anonymity, Individual
in web can expresses his or her personality. In cyberspace, a user is able to have
several electronic personalities, and acts them.
Reality of virtual world
A User believes that cyber personality exists and cyberspace is part of real world . The
confidence can make activities on cyberspace fall into a state of absorption. The more
a state of absorption, a boundary between of cyberspace and physical space
disappears. In addition to having a role, people take part in activities on cyberspace. It
makes cyberspace feel more reality.
8/19/2019 Prachi cyber security
Interaction
Social interaction and entertainment
Cyberspace is a new domain for social interaction and entertainment. When it’s used
as private space, common value or idea makes social network. Social interactions of
this kind are chatting on internet community, on-line game, and club on website, and
so on. Through these activities, people throughout world have cyber social interaction.
Community for common interests
People desire space to share their idea and information for business or work. Website
or internet network is used for this. A work or information on web is shared and
utilized for everyone’s each goal.
Public space equality
Web is impartial space. There are not racial or religious or sex prejudice. Horizontal
relationship exists between members in cyberspace. Activities and benefits (Social
communication and information, and so on) on cyberspace are open to everyone who
can use it.
8/19/2019 Prachi cyber security
Destruction of public communications (negative)
People in cyberspace give loose to communicate each other. There is not a supervisor
or controller. So public communication can be break and intergenerational
communication gap is able to become serious. So far, there is not a rule or a regulation
about cyber communication. And anonymity makes control of communication in
cyberspace impossible.
Cyber egoism (negative)
In fact, nobody can control or regulate actions on cyberspace. There is possibility of
cyber egoism and irresponsible behaviors have a negative effect on realities of life. So
far, there is not a rule or a regulation about cyber communication. And nobody can
punish a criminal act on web.
Information Source
Systematizing or structuralizing of information
Information of cyberspace builds up network around nodes. The node means what
kind of information, which contents, and so on. Information on web is systematized or
structuralized around these nodes .
8/19/2019 Prachi cyber security
User as a knowledge creator
In cyberspace, anybody can be a writer or an author, and anybody can show their
music or essay that they have created. Users on web make information as well as take
it. A boundary between user and creator is ambiguous.
Web resource accessibility
Web resource is open to everyone. In cyberspace, information is shared and
circulated free .
Information Standardizing
For more use, Information in cyberspace needs to be standardized . Currently Most of
web contents are produced as standardized form. So user can apply them without
converting.
Hypertext
World Wide Web is huge network that is connected each site as hypertext link.
Through hypertext, without map of information, user can get web resource easily.
8/19/2019 Prachi cyber security
Meta search engines
A metasearch engine (or aggregator) is a search tool that uses another search
engine's data to produce their own results from the Internet. Metasearch
engines take input from a user and simultaneously send out queries to third
party search engines for results.
8/19/2019 Prachi cyber security
CYBER INFRASTRUCTURE
RELATIONSHIP
8/19/2019 Prachi cyber security
Infrastructure is a fundamentally relational concept, relational means the way in
which two or more people or things are connected. It is marked by ambiguity and
multiple meanings.
An infrastructure occurs when the tension between local and global is resolved.
That is, an infrastructure occurs when local practices are afforded by a larger-scale
technology which can then be used in a natural, ready-to-hand fashion .
Like recently there have been terms like “grid computing”, “e-science”..etc we refer
to these as “cyberinfrastructure,” .These projects have attracted significant
investment from major funding agencies, substantial participation from domain
scientists, and considerable interest from researchers whose practice focuses on
issues in computer-supported cooperative work and science studies. “
Relationships in cyberinfrastructure are temporal as their properties change over
time.
8/19/2019 Prachi cyber security
Aspects of relationship in cyberinfrastructure are:
• Embeddedness:
infrastructures depend on a range of existing technical and social structures for
identity and function.
• Transparency:
infrastructure invisibly supports tasks without needing to be assembled or reinvented
for each task.
• Reach or Scope:
infrastructure reaches beyond a single event of one-site practice, and may be either
spatial or temporal.
• Learned as a part of membership:
artifacts and organizational arrangements come to be taken for granted by members.
Linked with conventions for practice: infrastructure both shapes, and is shaped by,
the conventions of a community of practice.
• Embodiment of standards:
Modified by conflicting conventions, infrastructure takes on transparency by plugging
into other infrastructures and tools in a standardized fashion.
8/19/2019 Prachi cyber security
• Installed base:
Infrastructures depend on previous ones, and on existing systems of support,
funding, training, and expertise.
• Visible upon breakdown:
generally when infrastructure breaks down it is noticed; otherwise it is largely
invisible.

More Related Content

What's hot

CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
Panjab University
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
Naren Naren
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
ARIN
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
atuljaybhaye
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Dharmik Navadiya
 
Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
Stephanie Kimbro Dolin
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
Tushar Rajput
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 

What's hot (20)

CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Unit 1
Unit 1Unit 1
Unit 1
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
It act 2000
It act 2000It act 2000
It act 2000
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 

Similar to Cyberspace

Amaxus con webdoc_10773
Amaxus con webdoc_10773Amaxus con webdoc_10773
Amaxus con webdoc_10773vafopoulos
 
TECHNOLOGY.pptx
TECHNOLOGY.pptxTECHNOLOGY.pptx
TECHNOLOGY.pptx
PradipMaurya5
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
ijait
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media TheoryAkshay Iyer
 
Walking Our Way to the Web
Walking Our Way to the WebWalking Our Way to the Web
Walking Our Way to the Web
Fabien Gandon
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
SONISINGH52160
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
Ashley Thomas
 
Internet Essay
Internet EssayInternet Essay
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
ijtsrd
 
03 networked media and 3 d internet
03 networked media and 3 d internet03 networked media and 3 d internet
03 networked media and 3 d internet
Debkumar_Bera
 
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptx
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptxInternet Literacy & Social Media_Digital Literacy Fundamentals.pptx
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptx
Excellence Foundation for South Sudan
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ajinkya Dubey
 
Edu.03
Edu.03 Edu.03
Edu.03 assignment
Edu.03 assignment Edu.03 assignment
Edu.03 assignment
LudiyaStanlySG
 
Network literacy-high-res
Network literacy-high-resNetwork literacy-high-res
Network literacy-high-res
Carlise Schneider
 
Dark Web1.docx
Dark Web1.docxDark Web1.docx
Dark Web1.docx
mayurbokan
 
Technology .pdf
Technology .pdfTechnology .pdf
Technology .pdf
DileepDileep25
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
David De Roure
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
Cathy Oxley
 
social networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptxsocial networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptx
Nikki150019
 

Similar to Cyberspace (20)

Amaxus con webdoc_10773
Amaxus con webdoc_10773Amaxus con webdoc_10773
Amaxus con webdoc_10773
 
TECHNOLOGY.pptx
TECHNOLOGY.pptxTECHNOLOGY.pptx
TECHNOLOGY.pptx
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media Theory
 
Walking Our Way to the Web
Walking Our Way to the WebWalking Our Way to the Web
Walking Our Way to the Web
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Internet Essay
Internet EssayInternet Essay
Internet Essay
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
 
03 networked media and 3 d internet
03 networked media and 3 d internet03 networked media and 3 d internet
03 networked media and 3 d internet
 
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptx
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptxInternet Literacy & Social Media_Digital Literacy Fundamentals.pptx
Internet Literacy & Social Media_Digital Literacy Fundamentals.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Edu.03
Edu.03 Edu.03
Edu.03
 
Edu.03 assignment
Edu.03 assignment Edu.03 assignment
Edu.03 assignment
 
Network literacy-high-res
Network literacy-high-resNetwork literacy-high-res
Network literacy-high-res
 
Dark Web1.docx
Dark Web1.docxDark Web1.docx
Dark Web1.docx
 
Technology .pdf
Technology .pdfTechnology .pdf
Technology .pdf
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
social networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptxsocial networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptx
 

More from G Prachi

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
G Prachi
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
G Prachi
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
G Prachi
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
G Prachi
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
G Prachi
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
G Prachi
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
G Prachi
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
G Prachi
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
G Prachi
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
G Prachi
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Administering security
Administering securityAdministering security
Administering security
G Prachi
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
G Prachi
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
G Prachi
 
Program security
Program securityProgram security
Program security
G Prachi
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
G Prachi
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
G Prachi
 

More from G Prachi (20)

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Administering security
Administering securityAdministering security
Administering security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Program security
Program securityProgram security
Program security
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Cyberspace

  • 1. VIRTUAL REALITY VS CYBERSPACE Virtual reality is the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors. Cyberspace is the notional environment in which communication over computer networks occurs. Notional means not existing in reality. It represents all the data stored online in the world of computer networks. So, cyberspace can be thought of as a virtual reality where one could "walk through" computer networks. 8/19/2019 Prachi cyber security
  • 2. CYBERSPACE AS A METAPHOR FOR INTERNET Metaphor is a thing regarded as representative or symbolic of something else. According to this interpretation, events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace". So that a website, for example, might be metaphorically said to "exist in cyberspace. Cyberspace provides new opportunities to reshape society and culture through "hidden" identities, or it can be seen as borderless communication and culture. Cyberspace is the "place" where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk. Not inside the other person's phone, in some other city. The place between the phones. [...] 8/19/2019 Prachi cyber security
  • 3. 8/19/2019 Prachi cyber security The "space" in cyberspace has more in common with the abstract meanings of the term than physical space. It can be attributed to the relationship between different pages (of books as well as webservers), considering the unturned pages to be somewhere "out there." The metaphor has been useful but the use of cyberspace as a metaphor has had its limits in areas where the metaphor becomes confused with physical infrastructure. It has also been critiqued as being unhelpful for falsely employing a spatial metaphor to describe what is inherently a network.
  • 4. ELECTROMAGNETIC SPECTRUM Electromagnetic radiation is classified by wavelength into radio wave, microwave, terahertz (or sub-millimeter) radiation, infrared, the visible region that is perceived as light, ultraviolet, X-rays and gamma rays. The behavior of EM radiation depends on its wavelength 8/19/2019 Prachi cyber security
  • 5. ESSENTIAL CHARACTERISTICS OF CYBERSPACE They are categorized into three classes including space as virtual world, interaction, and information. Specific features are as follows: Virtual world Second life space Cyberspace is a new domain for second life. It’s different physical space. A User can make electronic personality as long as they have a time and energy, because electronic personality consists of user’s information. Based on anonymity, Individual in web can expresses his or her personality. In cyberspace, a user is able to have several electronic personalities, and acts them. Reality of virtual world A User believes that cyber personality exists and cyberspace is part of real world . The confidence can make activities on cyberspace fall into a state of absorption. The more a state of absorption, a boundary between of cyberspace and physical space disappears. In addition to having a role, people take part in activities on cyberspace. It makes cyberspace feel more reality. 8/19/2019 Prachi cyber security
  • 6. Interaction Social interaction and entertainment Cyberspace is a new domain for social interaction and entertainment. When it’s used as private space, common value or idea makes social network. Social interactions of this kind are chatting on internet community, on-line game, and club on website, and so on. Through these activities, people throughout world have cyber social interaction. Community for common interests People desire space to share their idea and information for business or work. Website or internet network is used for this. A work or information on web is shared and utilized for everyone’s each goal. Public space equality Web is impartial space. There are not racial or religious or sex prejudice. Horizontal relationship exists between members in cyberspace. Activities and benefits (Social communication and information, and so on) on cyberspace are open to everyone who can use it. 8/19/2019 Prachi cyber security
  • 7. Destruction of public communications (negative) People in cyberspace give loose to communicate each other. There is not a supervisor or controller. So public communication can be break and intergenerational communication gap is able to become serious. So far, there is not a rule or a regulation about cyber communication. And anonymity makes control of communication in cyberspace impossible. Cyber egoism (negative) In fact, nobody can control or regulate actions on cyberspace. There is possibility of cyber egoism and irresponsible behaviors have a negative effect on realities of life. So far, there is not a rule or a regulation about cyber communication. And nobody can punish a criminal act on web. Information Source Systematizing or structuralizing of information Information of cyberspace builds up network around nodes. The node means what kind of information, which contents, and so on. Information on web is systematized or structuralized around these nodes . 8/19/2019 Prachi cyber security
  • 8. User as a knowledge creator In cyberspace, anybody can be a writer or an author, and anybody can show their music or essay that they have created. Users on web make information as well as take it. A boundary between user and creator is ambiguous. Web resource accessibility Web resource is open to everyone. In cyberspace, information is shared and circulated free . Information Standardizing For more use, Information in cyberspace needs to be standardized . Currently Most of web contents are produced as standardized form. So user can apply them without converting. Hypertext World Wide Web is huge network that is connected each site as hypertext link. Through hypertext, without map of information, user can get web resource easily. 8/19/2019 Prachi cyber security
  • 9. Meta search engines A metasearch engine (or aggregator) is a search tool that uses another search engine's data to produce their own results from the Internet. Metasearch engines take input from a user and simultaneously send out queries to third party search engines for results. 8/19/2019 Prachi cyber security
  • 10. CYBER INFRASTRUCTURE RELATIONSHIP 8/19/2019 Prachi cyber security Infrastructure is a fundamentally relational concept, relational means the way in which two or more people or things are connected. It is marked by ambiguity and multiple meanings. An infrastructure occurs when the tension between local and global is resolved. That is, an infrastructure occurs when local practices are afforded by a larger-scale technology which can then be used in a natural, ready-to-hand fashion . Like recently there have been terms like “grid computing”, “e-science”..etc we refer to these as “cyberinfrastructure,” .These projects have attracted significant investment from major funding agencies, substantial participation from domain scientists, and considerable interest from researchers whose practice focuses on issues in computer-supported cooperative work and science studies. “ Relationships in cyberinfrastructure are temporal as their properties change over time.
  • 11. 8/19/2019 Prachi cyber security Aspects of relationship in cyberinfrastructure are: • Embeddedness: infrastructures depend on a range of existing technical and social structures for identity and function. • Transparency: infrastructure invisibly supports tasks without needing to be assembled or reinvented for each task. • Reach or Scope: infrastructure reaches beyond a single event of one-site practice, and may be either spatial or temporal. • Learned as a part of membership: artifacts and organizational arrangements come to be taken for granted by members. Linked with conventions for practice: infrastructure both shapes, and is shaped by, the conventions of a community of practice. • Embodiment of standards: Modified by conflicting conventions, infrastructure takes on transparency by plugging into other infrastructures and tools in a standardized fashion.
  • 12. 8/19/2019 Prachi cyber security • Installed base: Infrastructures depend on previous ones, and on existing systems of support, funding, training, and expertise. • Visible upon breakdown: generally when infrastructure breaks down it is noticed; otherwise it is largely invisible.