SlideShare a Scribd company logo
Cy-Fi Arts Festival 2019
Essay Writing
Life in Cyberspace
By: Neha Nikhade
Virtual space formed by interaction of: hardware and software, electronic part of communication
systems, control systems, production systems, security systems and individual IoT products and
devices, electromagnetic spectrum, connected communication and computer networks. It acts
as
an interactive and virtual environment for a broad range of participants. it allows users to share
information, interact, swap ideas, play games, engage in discussions or social forums, conduct
business and create intuitive media, among many other activities.
Hearing about these concepts; cyber security, cybercrime, cyber war, cyber terrorism, etc.). But,
we don’t know that they are based on or derived from, cyberspace. For example, cyber security
is the security of cyberspace. Cybercrime is a crime committed within cyberspace.
Why we propose this definition:
We need this rather exact definition, because if we omit some part, we have future legal
problem. Public authority can act only in legislation defined framework. So if we omit
control systems, or individual products in age of IoT, our protection of cyberspace has
gaps or loopholes.
Parts of cyberspace (which can threatened by cyber-attacks) are not only HW and SW,
information and communications systems, but also electronic part of control systems,
production systems, security systems and individual products and devices - if they are
potentially affected via Internet.
Interaction is done by digital signals: not only using electric particles, but also
electromagnetic field.
Most recently not only consumer electronics with connection to internet
has been inserted to cyberspace, but in the age Internet of Things (IoT) also electronic
part of all things linkable to internet (car, fridge, drone and also advanced Hello Barbie
doll connected to wi-fi and cloud).
Cy-Fi Arts Festival 2019
Essay Writing
Persons are not part of cyberspace, they act in cyberspace.
Interaction in cyberspace is baseline for data manipulation
(production, processing, exchange, sharing, store, use) and also for
related services.
Definitions from other sources:
NATO Tallin manual: The environment formed by physical and non-physical
components, characterized by the use of computers and
electro-magnetic spectrum, to store, modify and exchange data using computer networks.
ITU: Cyberspace includes users, networks, devices, all software, processes,
information in storage or transit, applications, services, and systems that can
be connected directly or indirectly to networks.
Academia: Cyberspace is a global and dynamic domain (subject to constant change)
characterized by the combined use of electrons and electromagnetic spectrum, whose
purpose is to create, store, modify, exchange, share and extract, use, eliminate
information and disrupt physical resources.
USA: National Security Presidential Directive 54/Homeland Security Presidential
Directive 23 (NSPD-54/HSPD23): Cyberspace means the interdependent network
of information technology infrastructures and includes the Internet, telecommunications
networks, computer systems, and embedded processors and controllers in critical
industries.
Simple and useful is International Organization for Standardization definition:
“The complex environment resulting from the interaction of people, software and services
on the Internet by means of technology devices and networks connected to it, which does
not exist in any physical form.”
There are 2 levels of cyberspace, from the hacker’s view:
Core of cyberspace
Cy-Fi Arts Festival 2019
Essay Writing
Every electronics, which functionality is driven using some code (program) and which is
or potentially manageable or hack able via Internet.
Transmission media: cables (optic, metallic), electromagnetic spectrum, sound or other.
Code (programs, microcode).
Data.
Examples: Information systems, communication systems, electronics in modern cars, drones,
rockets, generally in all UAV, UGV, UVW, products of IoT including advanced Barbie doll ,
telemedicine devices.
Environment for elder generation of hackers.
Extended cyberspace
Everything (every system, product, artifact), which is manageable or hackable via
Internet.
In this case not only electronics of robot, but whole robot is part of cyberspace. If
somebody hacks electronics of the robot, he can change activity of the robot such as it
can push the person on the stairs with next fall.
Not only electronics of car, but the whole car. If somebody hacks electronics of car, he
can change emissions :-), speed, direction of car.
Not only electronics in rockets, tanks, ships but all of them. Because hacking electronics
of rocket such as Patriot means that hacker can change trajectory of the rocket and its
target.
Not only control system of the power plant, but whole power plant. Because hacking
control system means that hacker can stop producing energy or maybe destroy part of it.
Extended cyberspace is really attractive to new generation of hackers, including government
hackers in real cyber warfare. You have much more possibilities for really fluent hacks.

More Related Content

What's hot

Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
Snekha Raj
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
Casaleggio Associati
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World Speaks
Simplify360
 
Internet of Things by Sindhu TS
Internet of Things by Sindhu TSInternet of Things by Sindhu TS
Internet of Things by Sindhu TS
Mphasis
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
sankar s
 
Education and the Internet of Things
Education and the Internet of ThingsEducation and the Internet of Things
Education and the Internet of Things
Leo Gaggl
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Pratibha Kumari
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
Shivangi Dubey
 
Internet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected WorldInternet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected World
Jag Randhawa
 
Internet of things By Naveen Kumar Sharma
Internet of things By Naveen Kumar SharmaInternet of things By Naveen Kumar Sharma
Internet of things By Naveen Kumar Sharma
Naveen Sharma
 
IOT-internet of thing
IOT-internet of thingIOT-internet of thing
IOT-internet of thing
VISHALJAT3
 
Internet of things executive overview
Internet of things executive overviewInternet of things executive overview
Internet of things executive overview
Prosun Roy
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
Vaishnavu Pathayathodi
 
IoT Introduction
IoT IntroductionIoT Introduction
IoT Introduction
Benjamin Odoi-Lartey
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
Thanuja Seneviratne
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
Justin Grammens
 
IOT ppt
IOT pptIOT ppt
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
Sathvik N Prasad
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Maher Alshammari
 
Impact of internet of things
Impact of internet of thingsImpact of internet of things
Impact of internet of things
PrernaKaushik7
 

What's hot (20)

Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World Speaks
 
Internet of Things by Sindhu TS
Internet of Things by Sindhu TSInternet of Things by Sindhu TS
Internet of Things by Sindhu TS
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Education and the Internet of Things
Education and the Internet of ThingsEducation and the Internet of Things
Education and the Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
Internet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected WorldInternet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected World
 
Internet of things By Naveen Kumar Sharma
Internet of things By Naveen Kumar SharmaInternet of things By Naveen Kumar Sharma
Internet of things By Naveen Kumar Sharma
 
IOT-internet of thing
IOT-internet of thingIOT-internet of thing
IOT-internet of thing
 
Internet of things executive overview
Internet of things executive overviewInternet of things executive overview
Internet of things executive overview
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
IoT Introduction
IoT IntroductionIoT Introduction
IoT Introduction
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
IOT ppt
IOT pptIOT ppt
IOT ppt
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Impact of internet of things
Impact of internet of thingsImpact of internet of things
Impact of internet of things
 

Similar to ES_15 Author- Neha Nikhade

Toward social internet of vehicles concept architecture, and applications
Toward social internet of vehicles  concept architecture, and applicationsToward social internet of vehicles  concept architecture, and applications
Toward social internet of vehicles concept architecture, and applications
redpel dot com
 
Internet of things
Internet of thingsInternet of things
Internet of things
Arihant Kumar Seraogi
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
Hitesh Kumar Singh
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
Chuck Brooks
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
Istabraq M. Al-Joboury
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
csandit
 
03 networked media and 3 d internet
03 networked media and 3 d internet03 networked media and 3 d internet
03 networked media and 3 d internet
Debkumar_Bera
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
Ragesh Warrier
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
IOT report
IOT reportIOT report
IOT report
VISHALJAT3
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
Internet of things
Internet of thingsInternet of things
Internet of things
Ramiro Cid
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
Puneet Mishra
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
AI Publications
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
COEPD HR
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Govt. P.G. College Dharamshala
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET Journal
 

Similar to ES_15 Author- Neha Nikhade (20)

Toward social internet of vehicles concept architecture, and applications
Toward social internet of vehicles  concept architecture, and applicationsToward social internet of vehicles  concept architecture, and applications
Toward social internet of vehicles concept architecture, and applications
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
03 networked media and 3 d internet
03 networked media and 3 d internet03 networked media and 3 d internet
03 networked media and 3 d internet
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT report
IOT reportIOT report
IOT report
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

ES_15 Author- Neha Nikhade

  • 1. Cy-Fi Arts Festival 2019 Essay Writing Life in Cyberspace By: Neha Nikhade Virtual space formed by interaction of: hardware and software, electronic part of communication systems, control systems, production systems, security systems and individual IoT products and devices, electromagnetic spectrum, connected communication and computer networks. It acts as an interactive and virtual environment for a broad range of participants. it allows users to share information, interact, swap ideas, play games, engage in discussions or social forums, conduct business and create intuitive media, among many other activities. Hearing about these concepts; cyber security, cybercrime, cyber war, cyber terrorism, etc.). But, we don’t know that they are based on or derived from, cyberspace. For example, cyber security is the security of cyberspace. Cybercrime is a crime committed within cyberspace. Why we propose this definition: We need this rather exact definition, because if we omit some part, we have future legal problem. Public authority can act only in legislation defined framework. So if we omit control systems, or individual products in age of IoT, our protection of cyberspace has gaps or loopholes. Parts of cyberspace (which can threatened by cyber-attacks) are not only HW and SW, information and communications systems, but also electronic part of control systems, production systems, security systems and individual products and devices - if they are potentially affected via Internet. Interaction is done by digital signals: not only using electric particles, but also electromagnetic field. Most recently not only consumer electronics with connection to internet has been inserted to cyberspace, but in the age Internet of Things (IoT) also electronic part of all things linkable to internet (car, fridge, drone and also advanced Hello Barbie doll connected to wi-fi and cloud).
  • 2. Cy-Fi Arts Festival 2019 Essay Writing Persons are not part of cyberspace, they act in cyberspace. Interaction in cyberspace is baseline for data manipulation (production, processing, exchange, sharing, store, use) and also for related services. Definitions from other sources: NATO Tallin manual: The environment formed by physical and non-physical components, characterized by the use of computers and electro-magnetic spectrum, to store, modify and exchange data using computer networks. ITU: Cyberspace includes users, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. Academia: Cyberspace is a global and dynamic domain (subject to constant change) characterized by the combined use of electrons and electromagnetic spectrum, whose purpose is to create, store, modify, exchange, share and extract, use, eliminate information and disrupt physical resources. USA: National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23): Cyberspace means the interdependent network of information technology infrastructures and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries. Simple and useful is International Organization for Standardization definition: “The complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form.” There are 2 levels of cyberspace, from the hacker’s view: Core of cyberspace
  • 3. Cy-Fi Arts Festival 2019 Essay Writing Every electronics, which functionality is driven using some code (program) and which is or potentially manageable or hack able via Internet. Transmission media: cables (optic, metallic), electromagnetic spectrum, sound or other. Code (programs, microcode). Data. Examples: Information systems, communication systems, electronics in modern cars, drones, rockets, generally in all UAV, UGV, UVW, products of IoT including advanced Barbie doll , telemedicine devices. Environment for elder generation of hackers. Extended cyberspace Everything (every system, product, artifact), which is manageable or hackable via Internet. In this case not only electronics of robot, but whole robot is part of cyberspace. If somebody hacks electronics of the robot, he can change activity of the robot such as it can push the person on the stairs with next fall. Not only electronics of car, but the whole car. If somebody hacks electronics of car, he can change emissions :-), speed, direction of car. Not only electronics in rockets, tanks, ships but all of them. Because hacking electronics of rocket such as Patriot means that hacker can change trajectory of the rocket and its target. Not only control system of the power plant, but whole power plant. Because hacking control system means that hacker can stop producing energy or maybe destroy part of it. Extended cyberspace is really attractive to new generation of hackers, including government hackers in real cyber warfare. You have much more possibilities for really fluent hacks.